CVE-2026-27578
MEDIUMIf your organization runs n8n for AI workflow automation, patch immediately to 2.10.1 or 1.123.21. Any authenticated user with workflow editing rights can execute arbitrary JavaScript in the browsers of other users — including admins — enabling full account takeover and credential theft for every LLM API key stored in n8n. Treat this as a supply chain risk for your AI pipelines, not just a web app bug.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
| n8n | npm | — | No patch |
Severity & Risk
Recommended Action
- 1. PATCH: Upgrade to n8n 2.10.1 or 1.123.21 immediately — no workaround fully mitigates the risk. 2. WORKAROUND (if patching is delayed): Restrict workflow creation/editing to fully-trusted users only; disable the Webhook node via NODES_EXCLUDE=n8n-nodes-base.webhook. 3. CREDENTIAL ROTATION: Audit and rotate all LLM API keys, database credentials, and OAuth tokens stored in n8n after any potential exposure window. 4. DETECTION: Review n8n audit logs for unexpected workflow edits, new webhook endpoints, or privilege changes. Monitor for anomalous outbound connections from n8n host. 5. SEGMENTATION: Ensure n8n is not directly internet-exposed without authentication; restrict admin UI access by IP if feasible.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could inject arbitrary scripts into pages rendered by the n8n application using different techniques on various nodes (Form Trigger node, Chat Trigger node, Send & Wait node, Webhook Node, and Chat Node). Scripts injected by a malicious workflow execute in the browser of any user who visits the affected page, enabling session hijacking and account takeover. The issues have been fixed in n8n versions 2.10.1 and 1.123.21. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Webhook node by adding `n8n-nodes-base.webhook` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Exploitation Scenario
A threat actor with access to a low-privilege n8n account (e.g., a contractor, a compromised service account, or an insider) creates or modifies a workflow using the Chat Trigger or Webhook node, embedding a JavaScript payload in the node configuration. When an admin opens the n8n dashboard and navigates to the affected workflow, the script executes in their browser — stealing the session cookie or Bearer token. The attacker replays the stolen token to authenticate as admin, then enumerates all stored credentials (OpenAI API keys, database passwords, Slack tokens), exfiltrates them, and modifies production AI workflows to insert silent data exfiltration steps or prompt injection instructions that affect downstream LLM behavior.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N References
- github.com/n8n-io/n8n/commit/062644ef786b6af480afe4a0f12bc6d70040534a Patch
- github.com/n8n-io/n8n/commit/062644ef786b6af480afe4a0f12bc6d70040534a Patch
- github.com/n8n-io/n8n/commit/062644ef786b6af480afe4a0f12bc6d70040534a Patch
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6 Patch
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6 Patch
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6 Patch
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e Patch
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e Patch
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e Patch
- github.com/n8n-io/n8n/security/advisories/GHSA-2p9h-rqjw-gm92 Vendor
- github.com/n8n-io/n8n/security/advisories/GHSA-2p9h-rqjw-gm92 Vendor
- github.com/n8n-io/n8n/security/advisories/GHSA-2p9h-rqjw-gm92 Vendor