CVE-2026-27577
CRITICALCVE-2026-27577 is a critical RCE in n8n's expression evaluation engine (CVSS 9.9) that allows any authenticated user with workflow edit rights to execute arbitrary OS commands on the n8n host. If your AI agent infrastructure or automation pipelines run on n8n, patch immediately to 2.10.1, 2.9.3, or 1.123.22 — no exceptions. Exposure is especially severe for organizations using n8n to orchestrate LLM workflows, as compromising the automation host yields full control over agent tool invocations, stored AI API keys, and all downstream systems.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
Severity & Risk
Recommended Action
- 1. PATCH NOW: Upgrade to n8n 2.10.1, 2.9.3, or 1.123.22 — these fix all known expression injection chains including the predecessor CVE-2025-68613. 2. AUDIT PERMISSIONS IMMEDIATELY: Restrict workflow create/edit rights to fully trusted users only; revoke access from contractors, test accounts, and any non-essential identities. 3. ROTATE ALL CREDENTIALS: After patching, rotate every credential stored in n8n (AI API keys, database passwords, webhook secrets, OAuth tokens). 4. HARDEN RUNTIME: Run n8n in a container with dropped Linux capabilities, read-only root filesystem where possible, and egress network filtering limited to required endpoints only. 5. DETECT EXPLOITATION: Enable process-level auditing (auditd or eBPF) on the n8n host to detect unexpected child process spawning from the n8n process. Review n8n audit logs for unusual expression patterns or workflow modifications by non-admin users. 6. VULNERABILITY SCAN: If patching is delayed, deploy a WAF rule blocking known expression injection patterns as a temporary (not sufficient) control.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Exploitation Scenario
An adversary compromises a low-privilege n8n account via credential stuffing, phishing, or an insider threat. They create or modify a workflow and embed a crafted expression in a workflow parameter — for example, inside a Code node or a data transformation field — that calls the host's command execution interface to spawn a reverse shell. Because expression evaluation runs under the n8n process's OS privileges without adequate sandboxing, the attacker immediately gains code execution on the host. From that foothold, they extract environment variables and n8n's credential store to harvest all AI API keys and service credentials, then pivot: they can issue malicious LLM API calls, exfiltrate connected RAG databases, inject poisoned workflow steps that persist into production AI automation pipelines trusted by other users and downstream systems, or use the n8n host as a pivot into the internal network.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H References
- docs.n8n.io/hosting/securing/overview Not Applicable
- docs.n8n.io/hosting/securing/overview Not Applicable
- docs.n8n.io/hosting/securing/overview Not Applicable
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6 Patch
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6 Patch
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6 Patch
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e Patch
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e Patch
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e Patch
- github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp Not Applicable
- github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp Not Applicable
- github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp Not Applicable
- github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr Mitigation Vendor
- github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr Mitigation Vendor
- github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr Mitigation Vendor