Authenticated Sandbox-Escape RCE Vulnerabilities in n8n Workflow Automation
JFrog researchers disclosed two vulnerabilities in the n8n workflow automation platform that allow an authenticated attacker to escape built-in sandboxes and achieve remote code execution (RCE) on the main n8n node, potentially leading to full instance compromise and access to sensitive connected systems (e.g., APIs, credentials, and internal tooling). The issues are tracked as CVE-2026-1470 (CVSS 9.9) and CVE-2026-0863 (CVSS 8.5); exploitation is possible even in configurations where n8n runs in “internal” execution mode, which n8n documentation already warns is risky for production due to weaker isolation between the application and task runner processes.
Technical details indicate both flaws are sandbox escapes driven by language/runtime edge cases: CVE-2026-1470 abuses JavaScript expression sandboxing (including with-statement handling) to resolve a constructor path to Function and execute arbitrary JavaScript, while CVE-2026-0863 escapes the Python task executor sandbox via Python introspection and runtime behavior (notably Python 3.10+ AttributeError.obj) to regain access to restricted builtins/imports and execute OS commands. Recommended remediation is to upgrade n8n to fixed versions (for CVE-2026-1470: 1.123.17, 2.4.5, or 2.5.1; for CVE-2026-0863: 1.123.14, 2.3.5, or 2.4.2).
How this story unfolded
4 events from the most recent confirmed update back to the earliest known activity.
Public detection and exploit interest emerges around vulnerable n8n instances
By January 29, 2026, reporting noted public Nuclei templates for identifying vulnerable n8n deployments and indicated a proof-of-concept for CVE-2026-0863 might be added to JFrog's technical write-up. This raised concern that attackers would begin scanning for exposed self-hosted instances.
JFrog publicly discloses technical details of the two n8n flaws
On January 28, 2026, JFrog publicly disclosed the vulnerabilities, explaining that CVE-2026-1470 abuses JavaScript sandbox weaknesses and CVE-2026-0863 exploits Python runtime behavior in internal execution mode. Researchers warned that successful exploitation could expose credentials, API keys, and connected enterprise systems.
n8n releases patches for CVE-2026-1470 and CVE-2026-0863
n8n issued fixes across multiple supported version branches for the two vulnerabilities, and n8n Cloud was reported as already remediated. Unpatched self-hosted and cloud deployments remained exposed depending on version and configuration.
JFrog discovers and reports two n8n sandbox escape vulnerabilities
JFrog Security Research identified CVE-2026-1470 in n8n's JavaScript expression engine and CVE-2026-0863 in its Python Code node, both allowing authenticated users with workflow creation or edit access to achieve remote code execution. The flaws enable sandbox escape and potential full takeover of affected n8n instances.
Related entities
Vulnerabilities, threat actors, malware, products, organizations, and breaches Mallory has linked to this story.
Sources
5 references tracked. Mallory keeps watching after this page renders.
Two n8n sandbox escape vulnerabilities allow RCE | SC Media
scworld.com
Open sourceCVE-2026-1470 & CVE-2026-0863: Severe Sandbox Escape Vulnerabilities Expose n8n Instances to RCE
socradar.io
Open sourceMore Critical Flaws on n8n Could Compromise Customer Security
darkreading.com
Open sourceNew sandbox escape flaw exposes n8n instances to RCE attacks
bleepingcomputer.com
Open sourceTwo High-Severity n8n Flaws Allow Authenticated Remote Code Execution
thehackernews.com
Open sourceSee the full picture, correlated to your attack surface.
Map indicators from this story to your assets and identify affected systems in minutes.
Every observed campaign, victim, and pivot linked to actors named in this story.
Malware, exploits, and IOCs connected to the activity described here.
YARA, Sigma, and Snort rules deployed to your SIEM as soon as they’re published.
Get matching new stories delivered to your team as they break — not the next morning.
Ask questions about this story and take action on the answers.



