CVE-2026-21877
CRITICAL NUCLEIN8n < 1.121.3 - Code Injection
Title source: ruleDescription
n8n is an open source workflow automation platform. In versions 0.121.2 and below, an authenticated attacker may be able to execute malicious code using the n8n service. This could result in full compromise and can impact both self-hosted and n8n Cloud instances. This issue is fixed in version 1.121.3. Administrators can reduce exposure by disabling the Git node and limiting access for untrusted users, but upgrading to the latest version is recommended.
Exploits (1)
Nuclei Templates (1)
n8n >= 0.123.0 and < 1.121.3 - Remote Code Execution
CRITICALVERIFIEDby s4e-io
Shodan:
http.favicon.hash:-831756631
FOFA:
icon_hash="-831756631"
Scores
CVSS v3
9.9
EPSS
0.1414
EPSS Percentile
94.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-434
CWE-94
Status
published
Products (2)
n8n/n8n
0.123.0 - 1.121.3
npm/n8n
0.123.0 - 1.121.3npm
Published
Jan 08, 2026
Tracked Since
Feb 18, 2026