Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
Home/CyberSecurity News/Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
CyberSecurity News

Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full

New critical vulnerabilities discovered in the popular workflow automation platform n8n are sparking significant security concerns. Researchers warn these flaws, if chained, could allow attackers to...

Jennifer sherman
Jennifer sherman
May 18, 2026 3 Min Read
2 0

New critical vulnerabilities discovered in the popular workflow automation platform n8n are sparking significant security concerns. Researchers warn these flaws, if chained, could allow attackers to achieve full remote code execution (RCE) on affected systems.

Table Of Content

  • n8n Vulnerabilities
  • Prototype Pollution Leads to RCE
  • Git Node Enables Arbitrary File Read
  • XML Node Patch Bypass Reopens Risk
  • Affected Versions and Fixes

The vulnerabilities, disclosed via GitHub Security Advisories and tracked as CVE-2026-44789, CVE-2026-44790, and CVE-2026-44791, impact multiple core nodes within n8n, including HTTP Request, Git, and XML nodes.

 All issues carry a critical severity rating, with CVSS scores indicating high impact across confidentiality, integrity, and availability.

Security researcher Jubke published the advisories on GitHub, highlighting how low-privileged authenticated users with workflow editing permissions can exploit these flaws to compromise entire n8n instances.

n8n Vulnerabilities

Prototype Pollution Leads to RCE

The most severe issue (CVE-2026-44789) affects the HTTP Request node, where improper validation of pagination parameters allows attackers to trigger prototype pollution.

This vulnerability falls under CWE-1321 and enables manipulation of JavaScript object prototypes at a global level.

In practical terms, an attacker can inject malicious properties into application objects, which can later be leveraged alongside other techniques to execute arbitrary code on the host system.

Because n8n workflows often integrate with external APIs and internal systems, this flaw significantly expands the attack surface, especially in automation-heavy environments.

Git Node Enables Arbitrary File Read

A second critical flaw, tracked as CVE-2026-44790, affects the Git node and could let attackers inject malicious CLI flags during Git push operations to read arbitrary files on the server.

Classified under CWE-88 (argument injection), this issue allows attackers to access sensitive files, including configuration data, credentials, and environment variables.

In many cases, such access can directly lead to full system compromise.

XML Node Patch Bypass Reopens Risk

The third vulnerability (CVE-2026-44791) involves a patch bypass in the XML node. Despite a previous fix for a related issue, attackers can still exploit prototype pollution through alternate paths.

When chained with other vulnerable nodes, this flaw can also lead to remote code execution, effectively nullifying earlier security fixes and exposing systems that were assumed to be protected.

Affected Versions and Fixes

All three vulnerabilities affect n8n versions below 1.123.43, 2.20.7, and 2.22.1, and have been patched in versions 1.123.43, 2.20.7, 2.22.1, and later.

Users are strongly advised to upgrade immediately, as no complete workaround exists.

For organizations unable to patch immediately, researchers recommend limiting workflow creation and editing permissions to trusted users only.

Administrators can also turn off vulnerable nodes using the NODES_EXCLUDE environment variable:

  • Disable HTTP Request node: n8n-nodes-base.httpRequest
  • Disable Git node: n8n-nodes-base.git
  • Disable XML node: n8n-nodes-base.xml

However, these measures are only temporary and do not fully eliminate the risk.

These vulnerabilities highlight a broader security challenge in automation platforms like n8n, where interconnected nodes and extensible workflows can unintentionally amplify the impact of individual flaws.

With low-privileged access sufficient to trigger exploitation, organizations relying on n8n for critical automation should treat this disclosure as a high priority and ensure immediate remediation.

Failure to act could allow attackers to move from simple workflow access to full system control within minutes.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Linus Torvalds Says AI Bug Reports Have Made Linux Security

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us