Hot on the heels of an unauthenticated RCE disclosure, a second critical vulnerability has been revealed in the n8n open-source automation platform. Tracked as CVE-2026-21877, this flaw also carries a CVSS score of 10.0 but requires the attacker to have valid credentials, even with low privileges. A successful exploit allows an authenticated user to execute arbitrary code on the server, resulting in a complete compromise of the n8n instance. This affects both self-hosted and official n8n Cloud deployments, posing a severe risk of credential theft, data exposure, and lateral movement. The vulnerability was responsibly disclosed and patched in version 1.121.3 in November 2025. However, any organization that has not upgraded is exposed, especially to insider threats or in scenarios where an attacker has already obtained low-level user credentials.
CVE-2026-21877 is an authenticated remote code execution vulnerability. The CVSS 10.0 score is derived from the low attack complexity and the high impact on confidentiality, integrity, and availability, despite the authentication requirement. The attack vector is through the network. A malicious user with any level of authenticated access to an n8n instance can abuse certain application features (reportedly related to the Git node functionality) to cause the service to execute untrusted code. This means that a threat actor who has phished a low-privilege user's credentials can escalate their access to full control over the automation platform and the underlying server.
1.121.31.121.3 and laterThe vulnerability was responsibly disclosed by security researcher Théo Lelasseux, and a patch was made available in November 2025. The public disclosure occurred on January 7, 2026. While active exploitation in the wild has not been confirmed, the availability of technical details means that threat actors will likely develop exploits. The primary threat comes from attackers who have already achieved an initial foothold and are looking to escalate privileges.
The impact of exploiting CVE-2026-21877 is identical to the unauthenticated RCE flaw for an attacker who has already gained initial access. It provides a powerful privilege escalation vector. An attacker can:
sh, bash) or other unexpected child processes.1.121.3 or later should be considered vulnerable.D3-UBA: User Behavior Analysis to detect when a user account begins interacting with application features or data in a way that deviates from its established baseline.1.121.3 or newer. This is the primary and most effective remediation. This is a direct application of M1051 - Update Software.M1018 - User Account Management.The primary mitigation is to apply the security patch provided by the vendor by upgrading to a non-vulnerable version (1.121.3+).
Mapped D3FEND Techniques:
Enforcing the principle of least privilege by restricting permissions for non-administrative users can reduce the attack surface and prevent them from accessing vulnerable application features.
Mapped D3FEND Techniques:
As a temporary workaround, disabling the specific feature (Git node) that contains the vulnerability can mitigate the risk until patching is possible.
Mapped D3FEND Techniques:
The disclosure of a second CVSS 10.0 RCE within a short period underscores the urgency of patching. All organizations using n8n, whether self-hosted or on the cloud service, must verify they are running version 1.121.3 or later. This is not just a routine update; it is a critical security remediation. The authenticated nature of CVE-2026-21877 means any compromised account, no matter how low its privileges, can become a gateway to full system compromise. Patching is the only way to fully eliminate this privilege escalation path. A failure to patch leaves the instance vulnerable to both insider threats and external attackers who have obtained credentials through other means.
In addition to patching, this event should trigger a full review of user permissions within n8n. The principle of least privilege must be strictly enforced. Conduct an audit of all user accounts and roles. Remove any permissions that are not strictly necessary for a user's job function. Specifically, restrict the ability to create or modify workflows to a small, trusted group of administrative users. For CVE-2026-21877, this would prevent a compromised low-privilege account from accessing the vulnerable functionality needed to execute the RCE. This hardening measure serves as a critical compensating control and reduces the overall attack surface of the application.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats