CVE-2026-21858

CRITICAL EXPLOITED NUCLEI

N8n < 1.121.0 - Improper Input Validation

Title source: rule

Description

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.

Exploits (16)

nomisec WORKING POC 244 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2026-21858
github WRITEUP 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-21858
nomisec SCANNER 3 stars
by SystemVll · poc
https://github.com/SystemVll/CVE-2026-21858
github SUSPICIOUS 2 stars
by exploitChains · pythonpoc
https://github.com/exploitChains/poc-collection/tree/main/CVE-2026-21858
nomisec WORKING POC 1 stars
by EQSTLab · remote
https://github.com/EQSTLab/CVE-2026-21858
nomisec WORKING POC
by Alhakim88 · remote
https://github.com/Alhakim88/CVE-2026-21858
nomisec WORKING POC
by bamov970 · remote
https://github.com/bamov970/CVE-2026-21858
nomisec WRITEUP
by bgarz929 · poc
https://github.com/bgarz929/Ashwesker-CVE-2026-21858
nomisec SCANNER
by cropnet · poc
https://github.com/cropnet/Ni8mare
nomisec WRITEUP
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2026-21858
nomisec WORKING POC
by sastraadiwiguna-purpleeliteteaming · poc
https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
gitlab WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://gitlab.com/sastraadiwiguna-purpleeliteteaming/sastra-adi-wiguna-cve-2026-21858-holistic-audit
nomisec WRITEUP
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2026-21858
nomisec WORKING POC
by sec-dojo-com · remote
https://github.com/sec-dojo-com/CVE-2026-21858
vulncheck_xdb WRITEUP
remote
https://github.com/fevar54/POC_CVE-2025-29943_Write-what-where-Condition
metasploit WORKING POC
by dor attias, msutovsky-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/ni8mare_cve_2026_21858.rb

Nuclei Templates (1)

n8n Webhooks - Remote Code Execution
CRITICALVERIFIEDby rxerium
Shodan: http.favicon.hash:-831756631

Scores

CVSS v3 10.0
EPSS 0.0706
EPSS Percentile 91.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Exploitation Intel

VulnCheck KEV 2026-01-09

Classification

CWE
CWE-20
Status published

Affected Products (2)

n8n/n8n < 1.121.0
npm/n8n < 1.121.0npm

Timeline

Published Jan 08, 2026
Tracked Since Feb 18, 2026