CVE-2026-1470

9.9 CRITICAL

📋 TL;DR

This critical vulnerability in n8n's workflow Expression evaluation system allows authenticated users to execute arbitrary code on the server. Attackers can achieve full system compromise by exploiting insufficient isolation between user-supplied expressions and the underlying runtime. All n8n instances with authenticated users are affected.

💻 Affected Systems

Products:
  • n8n
Versions: Versions before commit aa4d1e5825829182afa0ad5b81f602638f55fa04
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All n8n deployments with workflow expression functionality enabled are vulnerable. The vulnerability requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/system-level privileges, data exfiltration, complete workflow manipulation, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to sensitive workflow data, credential theft from n8n's database, and lateral movement within the network.

🟢

If Mitigated

Limited to authenticated user compromise if network segmentation and least privilege are properly implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public research demonstrates practical exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions including commit aa4d1e5825829182afa0ad5b81f602638f55fa04

Vendor Advisory: https://github.com/n8n-io/n8n/commit/aa4d1e5825829182afa0ad5b81f602638f55fa04

Restart Required: Yes

Instructions:

1. Update n8n to the latest version. 2. Restart the n8n service. 3. Verify the commit hash includes aa4d1e5825829182afa0ad5b81f602638f55fa04.

🔧 Temporary Workarounds

Disable workflow expression functionality

all

Temporarily disable expression evaluation in workflows until patching is possible

Restrict authenticated user access

all

Limit workflow configuration to trusted administrators only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate n8n instances from critical systems
  • Apply principle of least privilege to n8n service account and restrict file system permissions

🔍 How to Verify

Check if Vulnerable:

Check if n8n version predates commit aa4d1e5825829182afa0ad5b81f602638f55fa04. Review git log or version metadata.

Check Version:

n8n --version or check package.json version

Verify Fix Applied:

Confirm current version includes commit aa4d1e5825829182afa0ad5b81f602638f55fa04 in the git history.

📡 Detection & Monitoring

Log Indicators:

  • Unusual expression evaluation patterns
  • Suspicious workflow modifications
  • Unexpected process spawns from n8n

Network Indicators:

  • Outbound connections from n8n to unexpected destinations
  • Command and control traffic patterns

SIEM Query:

process_name:n8n AND (event_type:execution OR cmdline:*eval* OR cmdline:*exec*)

🔗 References

📤 Share & Export