Article Details
Scrape Timestamp (UTC): 2026-02-05 11:44:05.853
Source: https://www.theregister.com/2026/02/05/n8n_security_woes_roll_on/
Original Article Text
Click to Toggle View
n8n security woes roll on as new critical flaws bypass December fix. Patch meant to close a severe expression bug fails to stop attackers with workflow access. Multiple newly disclosed bugs in the popular workflow automation tool n8n could allow attackers to hijack servers, steal credentials, and quietly disrupt AI-driven business processes. The vulnerabilities, collectively tracked as CVE-2026-25049, stem from weaknesses in how n8n sanitizes expressions inside workflows and could enable authenticated users to smuggle malicious code past safeguards introduced to fix CVE-2025-68613, a December 2025 vulnerability that already carried a near-perfect severity score. The new flaws carry a CVSS rating of 9.4, though some researchers argue the real-world impact could be even worse. n8n – an open source automation platform widely used to stitch together cloud apps, internal services, and increasingly AI-driven workflows – confirmed the issue in a security advisory published Wednesday. Maintainers warned that users with permission to create or modify workflows could craft expressions that trigger unintended command execution on the host system. "Additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613," n8n's maintainers said. "An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n." The disclosure lands just weeks after another maximum-severity n8n bug dubbed "ni8mare" exposed an estimated 100,000 automation servers to takeover through an unauthenticated remote code execution flaw that allowed attackers to seize vulnerable systems without logging in, underscoring how frequently the platform has landed in defenders' patch queues lately. Security outfit Pillar Security, which disclosed the new vulnerabilities alongside other researchers, told The Register that the vulnerabilities are particularly damaging because of the sensitive material automation platforms typically handle. The vendor warned that successful exploitation could hand attackers full control of vulnerable servers. That access could also spill out stored workflow credentials, including API keys and tokens used to connect to cloud and AI services. "What makes these vulnerabilities particularly dangerous is the combination of ease of exploitation and the high-value targets they expose," said Eilon Cohen, AI security researcher at Pillar Security. "If you can create a workflow in n8n, you can own the server. "For attackers, this means access to OpenAI keys, Anthropic credentials, AWS accounts, and the ability to intercept or modify AI interactions in real time – all while the workflows continue functioning normally." The risks may be even broader for users of n8n Cloud, the hosted version of the platform. According to Pillar, the service's multi-tenant architecture could allow a single malicious user to access other customers' data if the flaw is successfully exploited. Researchers at SecureLayer 7, who also discovered the vulnerability, said exploitation requires relatively little effort. In one proof-of-concept example, researchers demonstrated how an attacker could set up a workflow using a public webhook with no authentication. By inserting a short line of JavaScript using destructuring, they tricked n8n into running commands at the system level. Once that webhook is live, anyone who knows the URL could hit the endpoint and execute commands on the server hosting it. The disclosure highlights how automation platforms are becoming increasingly attractive targets as they take on a larger role within organizations. Tools such as n8n often store credentials that grant access to SaaS apps, internal systems, and AI services, so if attackers breach one of these platforms, access can quickly spill over into other environments. Patches addressing CVE-2026-25049 have now been released, and n8n is urging customers to update immediately. Security teams are being told to take a closer look at user permissions, review existing workflows, and rotate sensitive credentials in automation pipelines, particularly those connected to cloud or AI services. Because automation tools are tightly integrated into daily operations, breaches can be hard to detect. Workflows continue to run as usual, dashboards show everything is fine, and attackers can extract sensitive data without drawing much attention.
Daily Brief Summary
Recent vulnerabilities in the n8n automation tool, tracked as CVE-2026-25049, allow attackers to hijack servers and steal credentials, affecting AI-driven business processes.
These flaws, with a CVSS rating of 9.4, arise from inadequate expression sanitization, enabling malicious code execution despite previous patch efforts.
Authenticated users with workflow access can exploit these vulnerabilities to execute unintended commands on host systems, posing significant security risks.
Pillar Security and SecureLayer 7 researchers disclosed these vulnerabilities, emphasizing the ease of exploitation and the high-value targets exposed.
Successful exploitation could grant attackers access to sensitive credentials, including API keys and tokens for cloud and AI services, threatening broader organizational security.
n8n has released patches and advises immediate updates, alongside reviewing user permissions and rotating sensitive credentials to mitigate potential breaches.
The incident underscores the growing attractiveness of automation platforms as targets, given their integral role in organizational operations and data handling.