9.5
CRITICAL CVSS 4.0
CVE-2026-27493
n8n has Unauthenticated Expression Evaluation via Form Node
Description

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, a second-order expression injection vulnerability existed in n8n's Form nodes that could allow an unauthenticated attacker to inject and evaluate arbitrary n8n expressions by submitting crafted form data. When chained with an expression sandbox escape, this could escalate to remote code execution on the n8n host. The vulnerability requires a specific workflow configuration to be exploitable. First, a form node with a field interpolating a value provided by an unauthenticated user, e.g. a form submitted value. Second, the field value must begin with an `=` character, which caused n8n to treat it as an expression and triggered a double-evaluation of the field content. There is no practical reason for a workflow designer to prefix a field with `=` intentionally — the character is not rendered in the output, so the result would not match the designer's expectations. If added accidentally, it would be noticeable and very unlikely to persist. An unauthenticated attacker would need to either know about this specific circumstance on a target instance or discover a matching form by chance. Even when the preconditions are met, the expression injection alone is limited to data accessible within the n8n expression context. Escalation to remote code execution requires chaining with a separate sandbox escape vulnerability. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Review usage of form nodes manually for above mentioned preconditions, disable the Form node by adding `n8n-nodes-base.form` to the `NODES_EXCLUDE` environment variable, and/or disable the Form Trigger node by adding `n8n-nodes-base.formTrigger` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

INFO

Published Date :

Feb. 25, 2026, 11:16 p.m.

Last Modified :

March 5, 2026, 4:29 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2026-27493 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 N8n n8n
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 4.0 CRITICAL [email protected]
Solution
Upgrade n8n to a patched version to fix expression injection. Apply mitigations if upgrade is delayed.
  • Upgrade n8n to version 2.10.1, 2.9.3, or later.
  • Review form node usage for specific preconditions.
  • Exclude Form node via NODES_EXCLUDE.
  • Exclude Form Trigger node via NODES_EXCLUDE.
References to Advisories, Solutions, and Tools
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-27493 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-27493 vulnerability anywhere in the article.

  • The Hacker News
Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution ... Read more

Published Date: Mar 11, 2026 (1 week, 1 day ago)

The following table lists the changes that have been made to the CVE-2026-27493 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Mar. 05, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
    Added CPE Configuration OR *cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* versions up to (excluding) 1.123.22 *cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* versions from (including) 2.0.0 up to (excluding) 2.9.3 *cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* versions from (including) 2.10.0 up to (excluding) 2.10.1
    Added Reference Type GitHub, Inc.: https://github.com/n8n-io/n8n/commit/562d867483e871b0f1e31776252e23bd721df75b Types: Patch
    Added Reference Type GitHub, Inc.: https://github.com/n8n-io/n8n/issues/19 Types: Issue Tracking
    Added Reference Type GitHub, Inc.: https://github.com/n8n-io/n8n/releases/tag/[email protected] Types: Product
    Added Reference Type GitHub, Inc.: https://github.com/n8n-io/n8n/releases/tag/[email protected] Types: Product
    Added Reference Type GitHub, Inc.: https://github.com/n8n-io/n8n/releases/tag/[email protected] Types: Product
    Added Reference Type GitHub, Inc.: https://github.com/n8n-io/n8n/security/advisories/GHSA-75g8-rv7v-32f7 Types: Mitigation, Vendor Advisory
  • New CVE Received by [email protected]

    Feb. 25, 2026

    Action Type Old Value New Value
    Added Description n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, a second-order expression injection vulnerability existed in n8n's Form nodes that could allow an unauthenticated attacker to inject and evaluate arbitrary n8n expressions by submitting crafted form data. When chained with an expression sandbox escape, this could escalate to remote code execution on the n8n host. The vulnerability requires a specific workflow configuration to be exploitable. First, a form node with a field interpolating a value provided by an unauthenticated user, e.g. a form submitted value. Second, the field value must begin with an `=` character, which caused n8n to treat it as an expression and triggered a double-evaluation of the field content. There is no practical reason for a workflow designer to prefix a field with `=` intentionally — the character is not rendered in the output, so the result would not match the designer's expectations. If added accidentally, it would be noticeable and very unlikely to persist. An unauthenticated attacker would need to either know about this specific circumstance on a target instance or discover a matching form by chance. Even when the preconditions are met, the expression injection alone is limited to data accessible within the n8n expression context. Escalation to remote code execution requires chaining with a separate sandbox escape vulnerability. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Review usage of form nodes manually for above mentioned preconditions, disable the Form node by adding `n8n-nodes-base.form` to the `NODES_EXCLUDE` environment variable, and/or disable the Form Trigger node by adding `n8n-nodes-base.formTrigger` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
    Added CVSS V4.0 AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-94
    Added CWE CWE-95
    Added Reference https://github.com/n8n-io/n8n/commit/562d867483e871b0f1e31776252e23bd721df75b
    Added Reference https://github.com/n8n-io/n8n/issues/19
    Added Reference https://github.com/n8n-io/n8n/releases/tag/[email protected]
    Added Reference https://github.com/n8n-io/n8n/releases/tag/[email protected]
    Added Reference https://github.com/n8n-io/n8n/releases/tag/[email protected]
    Added Reference https://github.com/n8n-io/n8n/security/advisories/GHSA-75g8-rv7v-32f7
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.