Vulnerability in n8n Workflow Automation Platform Could Lead to Sensitive Information Exposure
CVE-2026-21858
Key Information:
Badges
What is CVE-2026-21858?
CVE-2026-21858 is a vulnerability found in the n8n Workflow Automation Platform, an open-source tool designed to allow users and organizations to automate complex workflows without extensive coding knowledge. This vulnerability affects versions from 1.65.0 up to, but not including, 1.121.0 and is particularly serious as it enables an unauthenticated remote attacker to access sensitive files stored on the underlying server via the execution of specific form-based workflows. The potential for exposing sensitive information means that organizations utilizing n8n to manage their workflows could face severe security risks, especially if the data accessed includes personally identifiable information (PII), business secrets, or other critical information. Based on the deployment configuration and workflow usage, this vulnerability could lead to further compromise, allowing attackers to escalate their access and potentially take control of affected systems.
Potential impact of CVE-2026-21858
-
Sensitive Information Exposure: The primary risk associated with this vulnerability is the possibility of exposing sensitive data, which could include customer records, financial information, or proprietary business details, potentially leading to significant data breaches.
-
Unauthorized System Access: Attackers exploiting this vulnerability may gain unauthorized access to the underlying server, which could facilitate additional attack vectors, allowing them to manipulate, corrupt, or even destroy critical data managed by the n8n platform.
-
Increased Risk of Compromise: Organizations using vulnerable versions of n8n may find themselves at greater risk for further compromises, as access to one part of a system can provide attackers the ability to pivot into other areas of the infrastructure, expanding their reach and impact.
Affected Version(s)
n8n >= 1.65.0, < 1.121.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π₯
Vulnerability reached the number 1 worldwide trending spot
- π
Vulnerability started trending
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
