Critical n8n Flaw Expose Automation Nodes to Full RCE

Three critical vulnerabilities have been disclosed in n8n, the popular open-source workflow automation platform, any one of which could allow an authenticated attacker to achieve remote code execution (RCE) or read arbitrary files from the host server.

Published five days ago by maintainer Jubke across three separate GitHub Security Advisories, the flaws affect n8n versions below 1.123.43, 2.20.7, and 2.22.1 and carry the maximum possible impact ratings under both the CVSS 3.1 and CVSS 4.0 scoring systems.

Organizations running self-hosted n8n instances should treat this as an urgent patch priority. With n8n widely deployed in enterprise automation pipelines, it often has access to sensitive APIs, databases, and internal systems.

Earlier in 2026, n8n was hit by separate critical RCE chains via expression sandbox escapes (CVE-2026-27577, CVSS 9.4) and unauthenticated form evaluation (CVE-2026-27493, CVSS 9.5), with security firm Pillar Security warning that exploitation could expose every credential stored in n8n’s encrypted database.

Three Critical n8n Vulnerabilities

The first vulnerability, CVE-2026-44789 (GHSA-c8xv-5998-g76h), resides in n8n’s HTTP Request node. An authenticated user with workflow creation or editing permissions can trigger global prototype pollution by supplying an unvalidated pagination parameter.

Under CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes), this pollution can be chained with other techniques to achieve full RCE on the n8n instance. Researcher sm1ee is credited with the discovery.

The second flaw, CVE-2026-44790 (GHSA-57g9-58c2-xjg3), targets the Git node’s Push operation.

By injecting arbitrary CLI flags into the node’s command string, an attacker can read any file accessible to the n8n server process, a classic argument injection bug classified under CWE-88.

In practice, this means credentials, environment variables, private keys, and configuration files are all fair game, potentially leading to full server compromise. Researcher simonkoeck reported this issue.

The third vulnerability, CVE-2026-44791 (GHSA-wrwr-h859-xh2r), is particularly alarming because it represents a patch bypass.

It circumvents the previously issued fix for GHSA-hqr4-h3xv-9m3r in the XML node, reintroducing prototype pollution through a different code path. When chained with additional nodes, this too can escalate to RCE on the host. Simonkoeck also reported this bypass.

All three vulnerabilities share an identical CVSS 4.0 vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H reflecting network-exploitable, low-complexity attacks requiring only low privileges.

The same advisory batch disclosed two additional flaws affecting the same patched versions:

  • CVE-2026-44792 — SQL injection in the Source Control Pull import of Data Table JSON files, targeting instances using PostgreSQL as the backend
  • CVE-2026-45732 — OAuth token overwrite via improperly controlled credential reconnect endpoints, affecting all instances with shared credentials

Patched Versions and Mitigations

n8n has released fixes across three version branches. Users should upgrade to one of the following immediately:

  • 1.123.43 or later
  • 2.20.7 or later
  • 2.22.1 or later

For environments where immediate upgrades are not feasible, n8n recommends two interim mitigations, though neither fully eliminates risk:

  • Restrict workflow creation and editing permissions to fully trusted users only
  • Turn off the affected nodes via the NODES_EXCLUDE environment variable: add n8n-nodes-base.httpRequestn8n-nodes-base.git, and n8n-nodes-base.xml respectively

The recurrence of prototype pollution in n8n, including a patch bypass, signals a deeper need for systematic input validation across all nodes that accept user-controlled data.

Given that n8n instances often sit at the heart of business-critical automation workflows and have privileged access to internal services, defenders should aggressively audit workflow permissions and monitor for anomalous node usage patterns even after patching.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Critical n8n Flaw Expose Automation Nodes to Full RCE appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading