Two vulnerabilities in n8n’s sandbox mechanism could be exploited for remote code execution (RCE) on the host system.
Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers ...
A JavaScript sandbox bug rated CVSS 9.9 enables attackers to bypass AST‑based protections, while a Python execution bypass ...
Critical n8n v CVE-2026-25049 allows authenticated workflow abuse to execute system commands and expose server data.
JFrog security researchers have exposed two critical vulnerabilities (CVE-2026-1470, rated 9.9; and CVE-2026-0863, rated 8.5) in the n8n workflow automation platform.
A previously published patch left a gaping hole that crooks will happily exploit.
Two vulnerabilities in the n8n workflow automation platform could allow attackers to fully compromise affected instances, access sensitive data, and execute arbitrary code on the underlying host.
The no-code automation solution n8n is very popular, as it allows even programming beginners to set up complex workflows with a graphical tool, make API requests, and use LLMs automatically. However, ...
A new around of vulnerabilities in the popular AI automation platform could let attackers hijack servers and steal ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results