Skip to main content
Mallory
Back to intelligence
internet-facing-service-vulnerabilitywidely-deployed-product-advisoryproof-of-concept-release

Authenticated Sandbox-Escape RCE Vulnerabilities in n8n Workflow Automation

Updated 2mo agoFirst seen Jan 28, 20265 sources

JFrog researchers disclosed two vulnerabilities in the n8n workflow automation platform that allow an authenticated attacker to escape built-in sandboxes and achieve remote code execution (RCE) on the main n8n node, potentially leading to full instance compromise and access to sensitive connected systems (e.g., APIs, credentials, and internal tooling). The issues are tracked as CVE-2026-1470 (CVSS 9.9) and CVE-2026-0863 (CVSS 8.5); exploitation is possible even in configurations where n8n runs in “internal” execution mode, which n8n documentation already warns is risky for production due to weaker isolation between the application and task runner processes.

Technical details indicate both flaws are sandbox escapes driven by language/runtime edge cases: CVE-2026-1470 abuses JavaScript expression sandboxing (including with-statement handling) to resolve a constructor path to Function and execute arbitrary JavaScript, while CVE-2026-0863 escapes the Python task executor sandbox via Python introspection and runtime behavior (notably Python 3.10+ AttributeError.obj) to regain access to restricted builtins/imports and execute OS commands. Recommended remediation is to upgrade n8n to fixed versions (for CVE-2026-1470: 1.123.17, 2.4.5, or 2.5.1; for CVE-2026-0863: 1.123.14, 2.3.5, or 2.4.2).

Share:
Authenticated Sandbox-Escape RCE Vulnerabilities in n8n Workflow Automation
Stay ahead

Get ahead of threats like this

Mallory correlates global threat intelligence with your attack surface — know if you’re exposed before adversaries strike.

EVENT TIMELINE

How this story unfolded

4 events from the most recent confirmed update back to the earliest known activity.

4 EVENTS
Jan 29, 20264mo ago

Public detection and exploit interest emerges around vulnerable n8n instances

By January 29, 2026, reporting noted public Nuclei templates for identifying vulnerable n8n deployments and indicated a proof-of-concept for CVE-2026-0863 might be added to JFrog's technical write-up. This raised concern that attackers would begin scanning for exposed self-hosted instances.

Jan 28, 20264mo ago

JFrog publicly discloses technical details of the two n8n flaws

On January 28, 2026, JFrog publicly disclosed the vulnerabilities, explaining that CVE-2026-1470 abuses JavaScript sandbox weaknesses and CVE-2026-0863 exploits Python runtime behavior in internal execution mode. Researchers warned that successful exploitation could expose credentials, API keys, and connected enterprise systems.

n8n releases patches for CVE-2026-1470 and CVE-2026-0863

n8n issued fixes across multiple supported version branches for the two vulnerabilities, and n8n Cloud was reported as already remediated. Unpatched self-hosted and cloud deployments remained exposed depending on version and configuration.

JFrog discovers and reports two n8n sandbox escape vulnerabilities

JFrog Security Research identified CVE-2026-1470 in n8n's JavaScript expression engine and CVE-2026-0863 in its Python Code node, both allowing authenticated users with workflow creation or edit access to achieve remote code execution. The flaws enable sandbox escape and potential full takeover of affected n8n instances.

The operational view lives in Mallory

See the full picture, correlated to your attack surface.

This page covers what’s public. Mallory adds the parts that aren’t — which of your assets are affected, which threat actors are using it right now, which detections to deploy, and what to do next.
Exposure mapping

Map indicators from this story to your assets and identify affected systems in minutes.

Threat actor evidence

Every observed campaign, victim, and pivot linked to actors named in this story.

Associated malware

Malware, exploits, and IOCs connected to the activity described here.

Detection signatures

YARA, Sigma, and Snort rules deployed to your SIEM as soon as they’re published.

Scheduled alerts

Get matching new stories delivered to your team as they break — not the next morning.

AI threads

Ask questions about this story and take action on the answers.