๐๐ซ๐ข๐ญ๐ข๐๐๐ฅ ๐๐๐ซ๐จ-๐๐ฅ๐ข๐๐ค ๐
๐ฅ๐๐ฐ ๐ข๐ง ๐ง๐๐ง ๐๐ฅ๐ฅ๐จ๐ฐ๐ฌ ๐
๐ฎ๐ฅ๐ฅ ๐๐๐ซ๐ฏ๐๐ซ ๐๐จ๐ฆ๐ฉ๐ซ๐จ๐ฆ๐ข๐ฌ๐
Researchers from Pillar Security have found two new critical vulnerabilities in self-hosted and cloud n8n deployments.
n8n is a popular open-source workflow automation platform powering hundreds of thousands of enterprise AI systems worldwide.
One of the flaws, tracked as CVE-2026-27493, can lead to full takeover of a server without the target clicking on anything and without the attacker needing to be authenticated.
๐งFix? n8n cloud users should have already benefitted from automated fixes.
People self-hosting n8n instances are urged to update to versions 2.10.1, 2.9.3 or 1.123.22 of n8n, depending on their release channel.
Pillar Security also recommended users to rotate all stored credentials if a vulnerable workflow is found in their n8n environment.
https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/