Description
n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime.

An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.
Published: 2026-01-27
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution (CWE-95)
Action: Immediate Patch
AI Analysis

Impact

n8n contains a critical Remote Code Execution vulnerability (CWE-95) in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration can bypass the sandbox, allowing evaluation in a context that is not sufficiently isolated from the underlying runtime. An attacker with legitimate credentials could execute arbitrary code with the privileges of the n8n process, leading to full compromise of the instance, unauthorized access to sensitive data, modification of workflows, and execution of system‑level operations.

Affected Systems

Any installation of n8n that permits authenticated users to supply expressions for workflow execution is affected. The Common Platform Enumeration data indicates all n8n versions, and specifically version 2.5.0, are vulnerable. No other vendor or product is listed in the affected set.

Risk and Exploitability

The CVSS score of 9.9 reflects a high severity with full system compromise as the impact. The EPSS score is reported as less than 1 %, indicating that while exploitation is low probability, it is still possible. The vulnerability is not currently catalogued in the CISA KEV list, but the presence of a remote code execution flaw with authenticated access warrants prompt attention. Likely attack vectors include remote exploitation by an authenticated user, and in environments where credentials can be obtained through phishing or other means, the risk increases dramatically.

Generated by OpenCVE AI on April 18, 2026 at 14:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch that neutralises the Expression sandbox bypass, for example by upgrading to the latest n8n release from the GitHub commit aa4d1e58 or newer.
  • Restrict the ability to create or edit workflows to trusted users only, ensuring that workspaces with expression evaluation are limited to those users who have a legitimate operational need.
  • If a patch is unavailable or upgrade cannot be performed immediately, disable or remove the Expression node from active workflows, or run the n8n instance in an isolated environment with restricted filesystem and network access to mitigate the impact of unchecked code execution.

Generated by OpenCVE AI on April 18, 2026 at 14:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5xrp-6693-jjx9 n8n Unsafe Workflow Expression Evaluation Allows Remote Code Execution
History

Fri, 20 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
cpe:2.3:a:n8n:n8n:2.5.0:*:*:*:*:node.js:*:*

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared N8n
N8n n8n
Vendors & Products N8n
N8n n8n

Tue, 27 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
Description n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.
Title Authenticated users can bypass the Expression sandbox mechanism to achieve full remote code execution on n8n’s main node.
Weaknesses CWE-95
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2026-01-27T14:36:43.973Z

Reserved: 2026-01-27T08:51:45.291Z

Link: CVE-2026-1470

cve-icon Vulnrichment

Updated: 2026-01-27T14:36:35.755Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T15:15:57.143

Modified: 2026-02-20T13:44:27.623

Link: CVE-2026-1470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:00:03Z

Weaknesses