CVE-2026-27497 – n8n Security Update for Critical Workflow Execution Vulnerabilities
“If attackers can break the workflow sandbox, they can turn automation into remote control.”
The n8n automation platform released security updates addressing multiple critical vulnerabilities affecting workflow execution and sandbox protections. The issues include CVE-2026-27577, CVE-2026-27493, CVE-2026-27495, and CVE-2026-27497. These vulnerabilities impact how the platform evaluates expressions, processes form inputs, and isolates JavaScript execution within workflow components. Exploitation could allow attackers to bypass sandbox protections, inject malicious code, or execute commands directly on the n8n server.
CVE-2026-27577 has a CVSS score of 9.4, which is Critical severity. CVE-2026-27493 has a CVSS score of 9.5, which is Critical severity. CVE-2026-27495 has a CVSS score of 9.4, which is Critical severity. CVE-2026-27497 has a CVSS score of 9.4, which is Critical severity. Several of these vulnerabilities allow remote code execution through workflow features such as expression evaluation, form nodes, and task runners. Because n8n automation systems often integrate with internal services, APIs, and sensitive data flows, successful exploitation could allow attackers to take control of automation processes and execute commands on the underlying server.
Key Details
- Affected Product
- N8n N8n
- Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- Low
- User Interaction
- None
- CWE Classification
- CWE-89