
Researchers have released details about a critical vulnerability that was silently patched in n8n, a platform used by many companies to build LLM-powered agents and automated workflows. The flaw can allow unauthenticated attackers to completely take over local n8n deployments, execute commands on the underlying system, and extract sensitive corporate data workflows typically have access to.
“The blast radius of a compromised n8n is massive,” researchers from data security company Cyera, who found the vulnerability, noted in their report on the vulnerability. “N8n is connecting countless systems, your organizational Google Drive, OpenAI API keys, Salesforce data, IAM systems, payment processors, customer databases, CI/CD pipelines, and more. It’s the central nervous system of your automation infrastructure.”
The n8n developers patched this issue in version 1.121.0 released on Nov. 18, but the release notes did not mention security fixes at the time, which seems to be standard procedure as n8n security advisories are intentionally released with a delay. The project has patched other critical RCE vulnerabilities since then, such as CVE-2025-68613, CVE-2025-68668, and CVE-2026-21877, so users should ensure they always update to the latest available version.
