Skip to content

Commit f601861

Browse files
1 parent 8b5fa9d commit f601861

1 file changed

Lines changed: 115 additions & 0 deletions

File tree

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vpcf-gvg4-6qwr",
4+
"modified": "2026-02-25T22:05:09Z",
5+
"published": "2026-02-25T22:05:09Z",
6+
"aliases": [
7+
"CVE-2026-27577"
8+
],
9+
"summary": "n8n: Expression Sandbox Escape Leads to RCE",
10+
"details": "## Impact\nAdditional exploits in the expression evaluation of n8n have been identified and patched following [CVE-2025-68613](https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp). \nAn authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n.\n\n## Patches\nThe issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities.\n\n## Workarounds\nIf upgrading is not immediately possible, administrators should consider the following temporary mitigations:\n- Limit workflow creation and editing permissions to fully trusted users only.\n- Deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation.\n\nThese workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.\n\n### Resources\n- Best practices for [securing n8n](https://docs.n8n.io/hosting/securing/overview/)\n- Initial vulnerability advisory: [CVE-2025-68613](https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "npm",
25+
"name": "n8n"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "1.123.22"
36+
}
37+
]
38+
}
39+
]
40+
},
41+
{
42+
"package": {
43+
"ecosystem": "npm",
44+
"name": "n8n"
45+
},
46+
"ranges": [
47+
{
48+
"type": "ECOSYSTEM",
49+
"events": [
50+
{
51+
"introduced": "2.0.0"
52+
},
53+
{
54+
"fixed": "2.9.3"
55+
}
56+
]
57+
}
58+
]
59+
},
60+
{
61+
"package": {
62+
"ecosystem": "npm",
63+
"name": "n8n"
64+
},
65+
"ranges": [
66+
{
67+
"type": "ECOSYSTEM",
68+
"events": [
69+
{
70+
"introduced": "2.10.0"
71+
},
72+
{
73+
"fixed": "2.10.1"
74+
}
75+
]
76+
}
77+
]
78+
}
79+
],
80+
"references": [
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e"
96+
},
97+
{
98+
"type": "WEB",
99+
"url": "https://docs.n8n.io/hosting/securing/overview"
100+
},
101+
{
102+
"type": "PACKAGE",
103+
"url": "https://github.com/n8n-io/n8n"
104+
}
105+
],
106+
"database_specific": {
107+
"cwe_ids": [
108+
"CWE-94"
109+
],
110+
"severity": "CRITICAL",
111+
"github_reviewed": true,
112+
"github_reviewed_at": "2026-02-25T22:05:09Z",
113+
"nvd_published_at": null
114+
}
115+
}

0 commit comments

Comments
 (0)