Critical n8n RCE Vulnerability (CVSS 10.0) Discovered: Urgent Upgrade Advised

Hackers could gain full control over n8n workflows, but a quick patch is available

Apr. 11, 2026 at 6:57pm

A highly detailed, luminous 3D illustration of a tangled web of neon-lit circuit boards, cables, and server racks, conceptually representing the complex digital infrastructure underlying the n8n workflow automation platform and the potential fragility of this critical system.A glowing digital landscape illustrates the vulnerability of the n8n workflow automation platform, as a critical security flaw threatens to expose the complex infrastructure powering countless organizations.NYC Today

A critical Remote Code Execution (RCE) vulnerability with a maximum CVSS severity score of 10.0 has been discovered in the popular open-source workflow automation platform n8n. The flaw, dubbed CVE-2026-21877, affects both self-hosted and cloud-based n8n deployments running versions 0.123.0 or higher, but below 1.121.3, potentially allowing attackers to execute malicious code and compromise affected systems.

Why it matters

This vulnerability poses a serious threat to n8n users, as it could grant hackers complete control over their workflow automation systems. The high severity score indicates the critical nature of this flaw, which affects a widely used open-source platform relied upon by many organizations for their daily operations.

The details

The vulnerability was discovered and responsibly disclosed by security researcher Théo Lelasseux (@theolelasseux). n8n quickly released version 1.121.3 in November 2025 to patch the issue. Until the update, the company recommends disabling the Git node and restricting access for untrusted users as a temporary mitigation measure.

  • The vulnerability was discovered in late 2025.
  • n8n released version 1.121.3 to address the flaw in November 2025.

The players

n8n

An open-source workflow automation platform used by many organizations for their daily operations.

Théo Lelasseux

A security researcher who discovered and responsibly disclosed the critical RCE vulnerability in n8n.

Got photos? Submit your photos here. ›

What they’re saying

“We must act swiftly to address this critical vulnerability and protect our systems from potential compromise.”

— Théo Lelasseux, Security Researcher

What’s next

The judge in the case will decide on Tuesday whether or not to allow Walker Reed Quinn out on bail.

The takeaway

This incident highlights the importance of vigilant maintenance and prompt updates for open-source software platforms like n8n, as they can be vulnerable to critical security flaws that could have far-reaching consequences if left unaddressed.