Critical Sandbox Escape Flaws in n8n Workflow Platform Enable Host Takeover

Two critical vulnerabilities in the popular open-source automation platform n8n allow authenticated attackers to escape its security sandbox and execute arbitrary code on the underlying host. Tracked as CVE-2026-1470 (CVSS 9.9) and CVE-2026-0863, these flaws were discovered by JFrog researchers. CVE-2026-1470 is a JavaScript sandbox escape that abuses the with statement to bypass sanitization and execute arbitrary code, while CVE-2026-0863 is a Python sandbox escape that leverages format-string introspection to regain access to restricted functions.

Although both vulnerabilities require authentication, they are rated as critical because even non-administrative users can exploit them to gain full control of the n8n instance and its host infrastructure. The flaws highlight the inherent difficulty of securely sandboxing dynamic languages like JavaScript and Python. Patches have been released in n8n versions 1.123.17/2.4.5/2.5.1 for CVE-2026-1470 and 1.123.14/2.3.5/2.4.2 for CVE-2026-0863.

Only self-hosted n8n instances are affected, as the cloud service has already been updated. However, scanning data shows a slow patching rate among users, with tens of thousands of instances still vulnerable weeks after a previous critical flaw was disclosed. This ongoing exposure underscores the urgent need for administrators to apply the latest security updates promptly.

Read more...

Read More

Got Something To Say?

Your email address will not be published.