n8n >= 0.123.0 and < 1.121.3 - Remote Code Execution
CVE-2026-21877
Verified
Description
n8n versions >= 0.123.0 and < 1.121.3 contain a critical authenticated remote code execution vulnerability via arbitrary file write. An authenticated user can exploit the Git node to overwrite critical files and execute untrusted code on the n8n server, potentially leading to full system compromise. The vulnerability affects both self-hosted and n8n Cloud instances.
Severity
Critical
CVSS Score
9.9
Exploit Probability
14%
Affected Product
n8n
Published Date
January 12, 2026
Template Author
s4e-io
CVE-2026-21877.yaml
id: CVE-2026-21877
info:
name: n8n >= 0.123.0 and < 1.121.3 - Remote Code Execution
author: s4e-io
severity: critical
description: |
n8n versions >= 0.123.0 and < 1.121.3 contain a critical authenticated remote code execution vulnerability via arbitrary file write. An authenticated user can exploit the Git node to overwrite critical files and execute untrusted code on the n8n server, potentially leading to full system compromise. The vulnerability affects both self-hosted and n8n Cloud instances.
impact: |
Full system compromise including access to all credentials, API tokens, OAuth secrets, database connections, and workflow automation capabilities. n8n becomes a single point of failure exposing all connected systems.
remediation: |
Upgrade to n8n v1.121.3 or later. If upgrading is not immediately possible, disable the Git node and limit access for untrusted users.
reference:
- https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
- https://nvd.nist.gov/vuln/detail/CVE-2026-21877
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
cvss-score: 9.9
cve-id: CVE-2026-21877
epss-score: 0.1414
epss-percentile: 0.94393
cwe-id: CWE-434
metadata:
verified: true
max-request: 1
vendor: n8n-io
product: n8n
shodan-query: http.favicon.hash:-831756631
fofa-query: icon_hash="-831756631"
tags: cve,cve2026,n8n,workflow,rce,authenticated,passive
http:
- method: GET
path:
- "{{BaseURL}}/signin"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>n8n.io"
case-insensitive: true
- type: dsl
name: vulnerable
dsl:
- compare_versions(version, '>= 0.123.0', '< 1.121.3')
- type: status
status:
- 200
extractors:
- type: regex
name: base64_content
group: 1
regex:
- '<meta name="n8n:config:sentry" content="([A-Za-z0-9+/=]+)"'
internal: true
- type: dsl
name: version
dsl:
- 'replace_regex(base64_decode(base64_content), ".*n8n@([0-9]+\\.[0-9]+\\.[0-9]+).*", "$1")'
internal: true
- type: dsl
dsl:
- '"n8n Version: " + version'
# digest: 4a0a0047304502202b2c5521dfa0f5d775505a1659b9f1c993f14f150f9416b11a9db0ced07fcc84022100eda748e4fa04995e9393b77fa2958519830f34b6a37bace1a9b5611f081c051e:922c64590222798bb761d5b6d8e729509.9Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE ID:
cve-2026-21877
CWE ID:
cwe-434
Remediation Steps
Upgrade to n8n v1.121.3 or later. If upgrading is not immediately possible, disable the Git node and limit access for untrusted users.