Authenticated User Exploitation in n8n Workflow Automation by Open Source Vendor
CVE-2026-27494

7.1HIGH

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
25 February 2026

What is CVE-2026-27494?

The n8n workflow automation platform has a vulnerability that allows authenticated users with the ability to create or modify workflows to escape the Python node sandbox. This flaw permits attackers to access certain built-in Python objects, enabling them to exfiltrate sensitive file contents or execute arbitrary code remotely. Particularly on installations utilizing internal Task Runners, this could lead to a complete compromise of the n8n host. Even on setups using external Task Runners, the ramifications may include unauthorized access to other tasks processed by the runner. The vulnerability has been corrected in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users are encouraged to upgrade their systems to these versions or beyond for effective remediation. For temporary mitigations, it is advisable to restrict workflow creation and editing permissions to trusted individuals or disable the Code node via the NODES_EXCLUDE setting. However, these measures do not provide full protection and should only be employed as stopgap solutions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

n8n < 1.123.22 < 1.123.22

n8n >= 2.0.0, < 2.9.3 < 2.0.0, 2.9.3

n8n >= 2.10.0, < 2.10.1 < 2.10.0, 2.10.1

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.