Categories Cybersecurity

Critical RCE bugs expose the n8n automation platform to host‑level compromise

The researchers demonstrated how Python sandbox constraints can be evaded, granting access to system resources that should be off-limits.

Urgent need to update

Both issues have been patched, and enterprises running n8n should ensure they are on updated versions. Until patches are applied, organizations are recommended to carefully review who has permissions to create or edit workflows, particularly in environments where n8n has access to internal networks, secrets, or privileged APIs.

CVE-2026-1470 has been fixed in version 1.123.17, 2.4.5, and 2.5.1, while CVE-2026-0863 is resolved in version 1.123.14, 2.3.5, and 2.4.2. Upgrading to any of these versions mitigates the risk of exploitation, researchers noted.