Ethical Hacking News
A critical vulnerability in a popular open-source workflow automation platform, n8n, has been disclosed, allowing attackers to escape the confines of the environment and gain complete control of the host server. Users are advised to update their platforms immediately and take other precautionary measures to prevent potential attacks.
Multiple critical vulnerabilities have been discovered in n8n, a popular open-source workflow automation platform. The flaws allow authenticated users to escape the environment and take control of the host server. The issues stem from incomplete AST-based sandboxing and lack of sanitization controls in user-written JavaScript expressions. Exploiting these flaws enables complete compromise of the n8n instance, allowing attackers to run arbitrary system commands and access sensitive data. The attack vector is straightforward, relying on a user's ability to create or edit workflows on the platform. Users are advised to update to the latest version (1.123.17 and 2.5.2) and take additional security measures to mitigate the risk.
In a disturbing revelation, multiple critical vulnerabilities have been discovered in the popular open-source workflow automation platform, n8n. These flaws, collectively tracked as CVE-2026-25049, allow authenticated users to escape the confines of the environment and take complete control of the host server.
Researchers at several cybersecurity companies, including Pillar Security, Endor Labs, and SecureLayer7, reported the problems, which stem from n8n's sanitization mechanism. The issues arise from incomplete AST-based sandboxing and a lack of sanitization controls in user-written server-side JavaScript expressions in workflows. This allows attackers to bypass patches for previous vulnerabilities, such as CVE-2025-68613.
The consequences of exploiting these flaws are severe, as they enable complete compromise of the n8n instance. Attackers can run arbitrary system commands on the server, steal all stored credentials and secrets, access sensitive configuration files, and even hijack AI workflows to intercept prompts, modify responses, and redirect traffic.
"This attack requires nothing special," says Pillar Security in a report. "If you can create a workflow, you can own the server." The attack vector is straightforward, as it relies on the user's ability to create or edit workflows on the platform. This means that even unprivileged users with access to n8n can potentially exploit these flaws.
The vulnerability was first discovered by Pillar Security, who demonstrated a chained bypass to the n8n team in December 2025. The researchers found that the fix implemented two days later was incomplete, allowing for another escape via a different mechanism using equivalent operations. N8n developers confirmed the bypass on December 30, and eventually released version 2.4.0 on January 12, 2026, addressing the issue.
The discovery of these vulnerabilities has raised concerns among users, who are advised to update their platforms to the most recent version (currently 1.123.17 and 2.5.2). Pillar Security recommends rotating the 'N8N_ENCRYPTION_KEY' and all credentials stored on the server, as well as reviewing workflows for suspicious expressions.
If updating is not possible at the moment, n8n administrators are provided with a workaround that acts as a temporary mitigation but does not completely address the risk. This includes limiting workflow creation and editing permissions to fully trusted users only, deploying n8n in a hardened environment with restricted operating system privileges and network access, and taking other precautionary measures.
It is worth noting that while there have been no public reports of CVE-2026-25049 being exploited, n8n's growing popularity has caught the attention of cybercriminals. Recently, GreyNoise reported seeing potentially malicious activity targeting exposed n8n endpoints vulnerable to Ni8mare (CVE-2026-21858), logging at least 33,000 requests between January 27 and February 3.
The future of IT infrastructure is increasingly dependent on secure workflow automation platforms like n8n. As such, it is essential for users to prioritize security and take prompt action to address these vulnerabilities. By doing so, they can prevent potential attacks and ensure the integrity of their workflows.
In conclusion, the discovery of critical vulnerabilities in n8n has significant implications for workflow automation platforms. It highlights the importance of robust security measures and the need for regular updates and patches. As users, we must remain vigilant and take proactive steps to protect ourselves against these types of threats.
Related Information:
https://www.ethicalhackingnews.com/articles/Critical-n8n-Flaws-Exposed-A-Security-Nightmare-for-Workflow-Automation-Platforms-ehn.shtml
https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/
https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
https://nvd.nist.gov/vuln/detail/CVE-2025-68613
https://www.cvedetails.com/cve/CVE-2025-68613/
https://nvd.nist.gov/vuln/detail/CVE-2026-21858
https://www.cvedetails.com/cve/CVE-2026-21858/
https://nvd.nist.gov/vuln/detail/CVE-2026-25049
https://www.cvedetails.com/cve/CVE-2026-25049/
https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/
https://en.wikipedia.org/wiki/Advanced_persistent_threat
https://www.endorlabs.com/
https://www.endorlabs.com/about
https://blog.securelayer7.net/advanced-persistent-threat/
https://cybersecuritynews.com/hackers-attacking-rdp-services/
https://www.greynoise.io/about
https://cyberpress.org/infiltrate-n8n-community-node/
https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html
Published: Wed Feb 4 15:48:09 2026 by llama3.2 3B Q4_K_M