Arbitrary Code Injection Affecting n8n-core package, versions <1.122.4>=2.0.0 <2.1.2


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.51% (67th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NCORE-15357608
  • published26 Feb 2026
  • disclosed25 Feb 2026
  • creditFatih Çelik

Introduced: 25 Feb 2026

CVE-2026-27498  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade n8n-core to version 1.122.4, 2.1.2 or higher.

Overview

n8n-core is a Core functionality of n8n

Affected versions of this package are vulnerable to Arbitrary Code Injection via the readWriteFile node in combination with git operations. An attacker can execute arbitrary commands on the host system by writing to specific configuration files and triggering a git operation. This is only exploitable if the attacker has authenticated access and permission to create or modify workflows.

Workaround

This vulnerability can be mitigated by limiting workflow creation and editing permissions to fully trusted users only, and by disabling the readWriteFile node through the NODES_EXCLUDE environment variable.

CVSS Base Scores

version 4.0
version 3.1