Vulnerability in n8n Workflow Automation Platform Could Lead to Sensitive Information Exposure
CVE-2026-21858

10CRITICAL

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
7 January 2026

Badges

πŸ₯‡ Trended No. 1πŸ“ˆ TrendedπŸ“ˆ Score: 1,860πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2026-21858?

CVE-2026-21858 is a vulnerability found in the n8n Workflow Automation Platform, an open-source tool designed to allow users and organizations to automate complex workflows without extensive coding knowledge. This vulnerability affects versions from 1.65.0 up to, but not including, 1.121.0 and is particularly serious as it enables an unauthenticated remote attacker to access sensitive files stored on the underlying server via the execution of specific form-based workflows. The potential for exposing sensitive information means that organizations utilizing n8n to manage their workflows could face severe security risks, especially if the data accessed includes personally identifiable information (PII), business secrets, or other critical information. Based on the deployment configuration and workflow usage, this vulnerability could lead to further compromise, allowing attackers to escalate their access and potentially take control of affected systems.

Potential impact of CVE-2026-21858

  1. Sensitive Information Exposure: The primary risk associated with this vulnerability is the possibility of exposing sensitive data, which could include customer records, financial information, or proprietary business details, potentially leading to significant data breaches.

  2. Unauthorized System Access: Attackers exploiting this vulnerability may gain unauthorized access to the underlying server, which could facilitate additional attack vectors, allowing them to manipulate, corrupt, or even destroy critical data managed by the n8n platform.

  3. Increased Risk of Compromise: Organizations using vulnerable versions of n8n may find themselves at greater risk for further compromises, as access to one part of a system can provide attackers the ability to pivot into other areas of the infrastructure, expanding their reach and impact.

Affected Version(s)

n8n >= 1.65.0, < 1.121.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • πŸ₯‡

    Vulnerability reached the number 1 worldwide trending spot

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.