Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章主要讲的是n8n这个工作流自动化平台发现了两个新的安全漏洞。这两个漏洞分别是CVE-2026-1470和CVE-2026-0863,CVSS评分都很高,分别为9.9和8.5。这两个漏洞都属于eval注入类型,允许经过身份验证的用户绕过沙盒机制,执行任意代码。这可能导致远程代码执行,进而控制整个n8n实例。 文章还提到这些漏洞可能带来的风险,比如攻击者可以获取企业核心数据和工具的访问权限。同时,建议用户升级到特定版本来修复问题。此外,最近还有其他安全问题被披露,显示这类平台的安全性挑战很大。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:n8n发现了两个高危漏洞,允许远程代码执行,影响严重,并给出修复建议。 最后,确保语言简洁明了,不使用复杂的术语,让读者一目了然。 </think> 研究人员披露了n8n工作流自动化平台的两个安全漏洞(CVE-2026-1470和CVE-2026-0863),分别允许经过身份验证的用户绕过JavaScript和Python沙盒限制,实现远程代码执行。这些漏洞可能导致攻击者完全控制n8n实例并获取企业核心数据的访问权限。建议用户更新到指定版本以修复问题。 2026-1-28 12:43:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Vulnerability / Workflow Automation

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution.

The weaknesses, discovered by the JFrog Security Research team, are listed below -

  • CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n's main node by passing specially crafted JavaScript code
  • CVE-2026-0863 (CVSS score: 8.5) - An eval injection vulnerability that could allow an authenticated user to bypass n8n's python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system

Successful exploitation of the flaws could permit an attacker to hijack an entire n8n instance, including under scenarios where it's operating under "internal" execution mode. In its documentation, n8n notes that using internal mode in production environments can pose a security risk, urging users to switch to external mode to ensure proper isolation between n8n and task runner processes.

Cybersecurity

"As n8n spans an entire organization to automate AI workflows, it holds the keys to core tools, functions, and data from infrastructure, including LLM APIs, sales data, and internal IAM systems, among others," JFrog said in a statement shared with The Hacker News. "This results in escapes giving a hacker an effective "skeleton key" to the entire corporation."

To address the flaws, users are advised to update to the following versions -

  • CVE-2026-1470 - 1.123.17, 2.4.5, or 2.5.1
  • CVE-2026-0863 - 1.123.14, 2.3.5, or 2.4.2

The development comes merely weeks after Cyera Research Labs detailed a maximum-severity security flaw in n8n (CVE-2026-21858 aka Ni8mare) that allows an unauthenticated remote attacker to gain complete control over susceptible instances.

"These vulnerabilities highlight how difficult it is to safely sandbox dynamic, high‑level languages such as JavaScript and Python," researcher Nathan Nehorai said. "Even with multiple validation layers, deny lists, and AST‑based controls in place, subtle language features and runtime behaviors can be leveraged to bypass security assumptions."

"In this case, deprecated or rarely used constructs, combined with interpreter changes and exception handling behavior, were enough to break out of otherwise restrictive sandboxes and achieve remote code execution."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html
如有侵权请联系:admin#unsafe.sh