Two vulnerabilities in n8n’s sandbox mechanism could be exploited for remote code execution (RCE) on the host system.
Critical n8n v CVE-2026-25049 allows authenticated workflow abuse to execute system commands and expose server data.
Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers ...
A JavaScript sandbox bug rated CVSS 9.9 enables attackers to bypass AST‑based protections, while a Python execution bypass ...
A previously published patch left a gaping hole that crooks will happily exploit.
JFrog security researchers have exposed two critical vulnerabilities (CVE-2026-1470, rated 9.9; and CVE-2026-0863, rated 8.5) in the n8n workflow automation platform.
Patch meant to close a severe expression bug fails to stop attackers with workflow access Multiple newly disclosed bugs in ...
The no-code automation solution n8n is very popular, as it allows even programming beginners to set up complex workflows with a graphical tool, make API requests, and use LLMs automatically. However, ...
Researchers disclosed two n8n vulnerabilities that let authenticated users bypass JavaScript and Python sandboxes to run ...