๐Ÿ›‘ CRITICAL n8n BUG ๐Ÿ› Self-Hosters Please Read - 10/10 Security Risk
Hey friends!
Hope everyone's 2026 is off to a fantastic start. Sorry for posting this across multiple communities but it is a 10/10 security risk.
A serious vulnerability (CVE-2026-21858) was publicly disclosed this week affecting all n8n versions before 1.121.0.
โš ๏ธ What you need to know:
- Severity: CVSS 10.0 (this is the HIGHEST it can be!!)
- Risk: Unauthenticated remote code execution via webhook endpoints
- Impact: Attackers can access your n8n instance without credentials, read files, execute code, and pivot to any connected systems (databases, APIs, cloud storage, CRMs, etc.)
๐Ÿ” How it works:
The vulnerability exploits how n8n handles Content-Type headers on webhooks. By manipulating these headers, attackers can overwrite internal variables and escalate to full system compromise.
๐Ÿ› ๏ธ What to do:
1. Check your version: Settings > About (or n8n --version)
2. If below 1.121.0: Update immediately
3. n8n Cloud users: You should already be patched, but verify
๐Ÿ”‘ Why this matters:
n8n typically holds keys to your entire stack - API tokens, OAuth credentials, database connections. A compromised instance means a compromised everything it touches.
The fix has been available since November 18, 2025 but there has been a surge of articles published about this issue the last couple days. If you have an old n8n instance running, make sure you update the version!
Stay safe out there! ๐Ÿ™
Article to more information here: https://www.theregister.com/2026/01/08/n8n_rce_bug/
9
12 comments
Chase Aldridge
2
๐Ÿ›‘ CRITICAL n8n BUG ๐Ÿ› Self-Hosters Please Read - 10/10 Security Risk
powered by
AI Automation Academy
skool.com/ai-automation-academy-7013
We focus on building practical AI agents and automations you can actually use in your business.
Build your own community
Bring people together around your passion and get paid.
Powered by