Arbitrary Code Injection Affecting n8n-workflow package, versions <1.120.9>=2.0.0 <2.9.1>=2.10.0 <2.10.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.15% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NWORKFLOW-15357609
  • published26 Feb 2026
  • disclosed25 Feb 2026
  • crediteilonc-pillar, Nil Ash, ediklab, Bartłomiej Dmitruk, zolbooo

Introduced: 25 Feb 2026

CVE-2026-27577  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade n8n-workflow to version 1.120.9, 2.9.1, 2.10.1 or higher.

Overview

n8n-workflow is a Workflow base code of n8n

Affected versions of this package are vulnerable to Arbitrary Code Injection via the expression evaluation system. An attacker can execute arbitrary system commands by crafting malicious expressions in workflow parameters.

Notes:

  1. This is only exploitable if the attacker has authenticated access with permissions to create or modify workflows;

  2. This is caused by an incomplete fix for CVE-2025-68613.

Workaround

This vulnerability can be mitigated by limiting workflow creation and editing permissions to fully trusted users only, and deploying the application in a hardened environment with restricted operating system privileges and network access.

CVSS Base Scores

version 4.0
version 3.1