New sandbox escape flaw exposes n8n instances to RCE attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户给的文章是关于n8n平台的两个漏洞。首先,我得通读文章,找出关键点。 文章开头提到两个漏洞,CVE-2026-1470和CVE-2026-0863,由JFrog的研究人员发现。这两个漏洞允许攻击者完全控制受影响的实例,访问敏感数据,并在主机上执行任意代码。 接下来,文章详细说明了每个漏洞的情况。CVE-2026-1470的严重性评分很高,9.9分,因为它允许在n8n的主要节点上执行任意代码。而CVE-2026-0863则利用Python的特性来绕过沙盒限制。 文章还提到n8n是一个流行的自动化平台,每周下载量超过20万次。虽然这两个漏洞需要认证权限来利用,但它们仍然被评级为高危,因为非管理员用户也可能利用这些漏洞获得基础设施级别的控制权。 修复方面,文章指出已经发布了补丁版本,并建议用户尽快升级。同时提到云平台已经修复了问题,只有自托管版本受到影响。 最后,文章还提到之前的一个严重漏洞Ni8mare以及目前仍有大量实例未修复的情况。 总结时需要包括:两个漏洞的存在、影响、发现者、漏洞类型(如代码执行)、以及修复建议。同时要保持简洁,在100字以内。 可能的结构:n8n平台存在两个高危漏洞(CVE编号),允许攻击者完全控制实例、访问敏感数据和执行任意代码。这两个漏洞由JFrog发现,并已在特定版本中修复。建议用户升级以应对风险。 </think> n8n平台存在两个高危漏洞(CVE-2026-1470和CVE-2026-0863),可导致攻击者完全控制实例、访问敏感数据并执行任意代码。这两个漏洞由JFrog发现,并已在特定版本中修复。建议用户升级以应对风险。 2026-1-28 18:0:23 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

New sandbox escape flaw exposes n8n instances to RCE attacks

Two vulnerabilities in the n8n workflow automation platform could allow attackers to fully compromise affected instances, access sensitive data, and execute arbitrary code on the underlying host.

Identified as CVE-2026-1470 and CVE-2026-0863, the vulnerabilities were discovered and reported by researchers at DevSecOps company JFrog.

Despite requiring authentication, CVE-2026-1470 received a critical severity score of 9.9 out of 10. JFrog explained that the critical rating was due to arbitrary code execution occurring in n8n’s main node, which allows complete control over the n8n instance.

Wiz

n8n is an open-source workflow automation platform that lets users link applications, APIs, and services into complex processes using a visual editor.

With more than 200,000 weekly downloads on npm, the library is used for task automation and supports integrations with AI and large language model (LLM) services.

The two vulnerabilities discovered by JFrog can be summarized as follows:

  • CVE-2026-1470 – An AST sandbox escape caused by improper handling of the JavaScript with statement allows a standalone constructor identifier to bypass sanitization and resolve to Function, enabling arbitrary JavaScript execution and resulting in full RCE on the main n8n node.
  • CVE-2026-0863 – A Python AST sandbox escape that combines format-string–based object introspection with Python 3.10+ AttributeError.obj behavior to regain access to restricted builtins and imports, allowing execution of OS commands and full RCE when Python runs as a subprocess on the main n8n node.

"These vulnerabilities highlight how difficult it is to safely sandbox dynamic, high‑level languages such as JavaScript and Python," JFrog explains.

"Even with multiple validation layers, deny lists, and AST‑based controls in place, subtle language features and runtime behaviors can be leveraged to bypass security assumptions," the researchers say.

Exploiting CVE-2026-1470 requires authentication because permissions to create or modify a workflow are necessary to escape the sandbox and execute commands on the host.

The flaw is still rated critical since non-admin users, assumed to be safely contained in most deployments, can exploit it to pivot to infrastructure-level control.

CVE-2026-1470 was fixed in versions 1.123.17, 2.4.5, and 2.5.1, while CVE-2026-0863 was addressed in n8n versions 1.123.14, 2.3.5, 2.4.2. Users are recommended to upgrade to the latest versions as soon as possible.

It should be noted that the n8n cloud platform has addressed the issues, and only self-hosted versions running a vulnerable release are affected.

Researcher Rhoda Smart, who explained CVE-2026-0863 in a technical blog post, promised to add a proof-of-concept exploit in the write-up, which could prompt attackers to hunt for and target self-hosted n8n deployments.

The n8n platform gained more attention recently, as security researchers reported critical flaws. Earlier this month, the max-severity flaw "Ni8mare" was disclosed,  which allows remote, unauthenticated attackers to take control of local n8n instances.

A week later, scans showed that 60,000 instances remained at risk. As of January 27, this number has fallen to 39,900 exposed instances, indicating a very slow patching rate among the platform’s users.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/new-sandbox-escape-flaw-exposes-n8n-instances-to-rce-attacks/
如有侵权请联系:admin#unsafe.sh