CVE-2026-21858
CRITICAL EXPLOITED NUCLEIN8n < 1.121.0 - Improper Input Validation
Title source: ruleDescription
n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.
Exploits (16)
github
WRITEUP
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-21858
github
SUSPICIOUS
2 stars
by exploitChains · pythonpoc
https://github.com/exploitChains/poc-collection/tree/main/CVE-2026-21858
nomisec
WORKING POC
by sastraadiwiguna-purpleeliteteaming · poc
https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
gitlab
WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://gitlab.com/sastraadiwiguna-purpleeliteteaming/sastra-adi-wiguna-cve-2026-21858-holistic-audit
vulncheck_xdb
WRITEUP
remote
https://github.com/fevar54/POC_CVE-2025-29943_Write-what-where-Condition
metasploit
WORKING POC
by dor attias, msutovsky-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/ni8mare_cve_2026_21858.rb
Nuclei Templates (1)
n8n Webhooks - Remote Code Execution
CRITICALVERIFIEDby rxerium
Shodan:
http.favicon.hash:-831756631
Scores
CVSS v3
10.0
EPSS
0.0706
EPSS Percentile
91.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Exploitation Intel
VulnCheck KEV
2026-01-09
Classification
CWE
CWE-20
Status
published
Affected Products (2)
n8n/n8n
< 1.121.0
npm/n8n
< 1.121.0npm
Timeline
Published
Jan 08, 2026
Tracked Since
Feb 18, 2026