top of page
perceptive_background_267k.jpg

Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

Published:

7 januari 2026 om 13:48:00

Alert date:

7 januari 2026 om 16:02:13

Source:

thehackernews.com

Click to open the original link from this advisory

Enterprise Applications, Zero-Day Vulnerabilities, Web Technologies

Cyera Research Labs disclosed a critical vulnerability (CVE-2026-21858) in n8n workflow automation platform with maximum CVSS score of 10.0. The flaw, codenamed Ni8mare, allows unauthenticated remote attackers to gain complete control over vulnerable instances. Security researcher Dor Attias from Cyera Research Labs discovered this maximum-severity security flaw. The vulnerability affects the popular workflow automation platform n8n and represents a significant security risk due to its unauthenticated remote access nature.

Technical details

CVE-2026-21858 is a Content-Type confusion vulnerability in n8n webhook and file handling mechanism. The vulnerability exists in the parseRequestBody() function that routes requests based on Content-Type headers. When Content-Type is multipart/form-data, it uses parseFormData() storing data in req.body.files; otherwise uses parseBody() storing data in req.body. The flaw occurs when file-handling functions like copyBinaryFile() are called without verifying Content-Type is multipart/form-data, allowing attackers to control req.body.files object and manipulate filepath parameters to read arbitrary local files instead of uploaded files. The vulnerable flow is in formWebhook() function that invokes copyBinaryFile() to act on req.body.files without proper validation.

Mitigation steps:

Upgrade to n8n version 1.121.0 or later immediately
Avoid exposing n8n to the internet
Enforce authentication for all Forms
Restrict or disable publicly accessible webhook and form endpoints as temporary workaround
Monitor for unauthorized access to sensitive files like /home/node/.n8n/database.sqlite and /home/node/.n8n/config
Review and secure API credentials, OAuth tokens, database connections, and cloud storage access

Affected products:

n8n workflow automation platform - all versions prior to and including 1.65.0

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page