n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated...
Description
n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.
AI Analyst Comment
Remediation
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Here is the vulnerability analysis report in the specified format.
Executive Summary:
A critical vulnerability has been discovered in the n8n workflow automation platform, identified as CVE-2026-1470. This flaw allows an authenticated user to execute arbitrary code on the server by crafting malicious expressions within a workflow, potentially leading to a complete system compromise, data theft, and disruption of business operations.
Vulnerability Details
CVE-ID: CVE-2026-1470
Affected Software: Unknown Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This is a Remote Code Execution (RCE) vulnerability within the n8n workflow Expression evaluation system. The root cause is insufficient sandboxing of the execution context where user-supplied expressions are processed. An attacker with valid credentials to the n8n instance can create or modify a workflow, embedding a specially crafted expression. When the workflow is executed, this expression is evaluated on the server with the same permissions as the n8n application process, bypassing intended security restrictions and allowing the attacker to run arbitrary system commands.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.9. Successful exploitation grants an attacker complete control over the n8n server. The potential business impact is severe and includes the theft of sensitive data processed by workflows (e.g., API keys, customer PII, database credentials), unauthorized modification or deletion of critical business automation, and using the compromised server as a pivot point to attack other internal systems. The reputational damage and financial loss resulting from such a compromise could be substantial.
Remediation Plan
Immediate Action:
Proactive Monitoring:
sh,bash,powershell.exe).Compensating Controls:
If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: False
Analyst Notes:
As of the publication date (Jan 27, 2026), there are no known public proof-of-concept exploits or observed in-the-wild attacks targeting this vulnerability. However, due to the critical CVSS score and the straightforward nature of the attack vector for an authenticated user, it is highly probable that a functional exploit will be developed and released by threat actors in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.9, this vulnerability represents an immediate and severe threat to the organization. While CVE-2026-1470 is not currently listed on the CISA KEV catalog, its high impact makes it a prime candidate for future inclusion. We strongly recommend that all system owners apply the vendor-supplied patches to affected systems immediately. If patching is delayed, the compensating controls listed above must be implemented as a temporary measure, and a formal plan for patching must be established with the utmost urgency.