Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Eight Critical n8n Vulnerabilities — Sandbox Escape to
Eight Critical n8n Vulnerabilities — Sandbox Escape to

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-25049

Eight Critical n8n Vulnerabilities — Sandbox Escape to

Popular workflow automation platform n8n hit with eight high-to-critical CVEs including a CVSS 10.0 unauthenticated RCE and sandbox escape bypassing...

Dylan H.

Security Team

February 7, 2026
4 min read

Affected Products

  • n8n < 2.5.2

Executive Summary

Eight new high-to-critical vulnerabilities have been disclosed in n8n, the popular open-source workflow automation platform used widely in enterprise DevOps and security operations. The most severe — CVE-2026-21858 (CVSS 10.0) — allows fully unauthenticated remote code execution.

A related flaw, CVE-2026-25049 (CVSS 9.4), bypasses a fix for a prior critical vulnerability from December 2025, enabling authenticated users to escape the n8n expression sandbox and execute system commands.

Minimum safe version: n8n 2.5.2+


The Eight CVEs

CVECVSSAuth RequiredDescription
CVE-2026-2185810.0NoUnauthenticated remote code execution
CVE-2026-250499.4YesSandbox escape via expression evaluation bypass
CVE-2026-218939.4AdminCommand injection for admin users
CVE-2026-2xxxxHighYesFile access control bypass
CVE-2026-2xxxxHighYesGit integration command injection
CVE-2026-2xxxxHighYesSSH node command injection
CVE-2026-2xxxxHighYesMerge node data exfiltration
CVE-2026-2xxxxHighYesPython execution sandbox escape

Deep Dive: The Sandbox Escape (CVE-2026-25049)

How It Works

n8n uses expression evaluation to allow users to reference data between workflow nodes using {{ }} syntax. This is sandboxed to prevent arbitrary code execution. However, researchers discovered that JavaScript destructuring syntax can escape the sandbox:

Attack Chain

1. Attacker creates a workflow with a webhook trigger
2. Webhook node contains a crafted expression using destructuring
3. When the webhook is triggered, the expression escapes the sandbox
4. System commands execute with the n8n process's privileges
5. Attacker gains shell access to the n8n server

Why the December Fix Failed

The December 2025 patch for the original sandbox escape (CVE-2025-XXXXX) blocked specific patterns but missed the destructuring syntax variant. CVE-2026-25049 exploits this gap, demonstrating the difficulty of securing JavaScript expression evaluation.


Deep Dive: Unauthenticated RCE (CVE-2026-21858)

CVE-2026-21858 is the most severe — a CVSS 10.0 vulnerability that requires no authentication whatsoever. An attacker who can reach an n8n instance over the network can execute arbitrary commands on the server.

This is particularly dangerous because:

  • Many n8n instances have webhook endpoints exposed to the internet
  • n8n processes often run with elevated privileges to interact with infrastructure
  • n8n typically has credentials stored for connected services (Slack, GitHub, databases, cloud APIs)

Who's at Risk

n8n is popular in:

Use CaseRisk LevelWhy
Security automation (SOAR)CriticalHas credentials for security tools, SIEM, etc.
DevOps CI/CDCriticalAccess to deployment pipelines and infrastructure
IT automationHighConnected to internal systems and APIs
Data integrationHighDatabase credentials and API keys stored
Internal toolingMediumDepends on exposure and permissions

Remediation

Immediate Actions

  1. Update to n8n 2.5.2+ — This is the minimum version that addresses all eight CVEs
  2. Audit exposed webhooks — Identify any n8n webhook endpoints accessible from the internet
  3. Review workflow permissions — Restrict who can create and modify workflows
  4. Rotate credentials — If running a vulnerable version, rotate all credentials stored in n8n

Network Controls

  • Place n8n behind a VPN or zero-trust proxy
  • Restrict webhook access to known IP ranges where possible
  • Monitor n8n server processes for unusual child process execution

Detection

Monitor for:

  • Unusual process spawning from the n8n process
  • Webhook requests with complex JavaScript expressions
  • Outbound connections from n8n to unexpected destinations
  • File access patterns outside normal n8n operation

References

  • The Hacker News — Critical n8n Flaw CVE-2026-25049
  • The Register — n8n's Latest Critical Flaws Bypass December Fix
  • Horizon3.ai — n8n RCE Under the Microscope

Related Reading

  • Researchers Disclose Critical n8n Flaws Enabling RCE and
  • CVE-2025-68613: n8n Remote Code Execution via Improper
  • Critical n8n Vulnerability (CVSS 10.0) Enables Complete
#n8n#Workflow Automation#RCE#Sandbox Escape#DevOps#Critical

Related Articles

CVE-2025-68613: n8n Remote Code Execution via Improper

CISA adds CVE-2025-68613 to the Known Exploited Vulnerabilities catalog — a CVSS 9.9 flaw in n8n's workflow expression evaluation system that enables...

5 min read

Critical n8n Vulnerability (CVSS 10.0) Enables Complete

A maximum-severity flaw dubbed 'Ni8mare' in the popular workflow automation platform n8n allows unauthenticated attackers to gain full control of...

3 min read

CVE-2026-27876 — Grafana Critical RCE via SQL Expression Chain

A chained attack exploiting SQL Expressions combined with a Grafana Enterprise plugin can lead to remote arbitrary code execution. All Grafana users should update immediately to close this attack vector.

5 min read
Back to all Security Alerts