
“According to security researchers at data security company Cyera, there were more than 100,000 n8n servers vulnerable to CVE-2026-21858,” Endor researchers said in the post. “We do not know how many of those install npm packages as community nodes in their environments. Still, this number shows that the n8n ecosystem is active and thriving.”
Tips for reducing risks
Workflow automation platforms like n8n are widely adopted for their capability to let teams link disparate systems without hand-coding every integration. But the community node ecosystem depends on npm packages and, therefore, inherits associated risks.
To mitigate exposure, Endor Labs researchers recommended measures such as preferring built-in integrations over community nodes, auditing package metadata and source code before installation, monitoring outbound network activity from automation hosts, and using isolated service accounts with limited privileges wherever possible. Endor Labs published a list of indicators of compromise (IOCs), including package names, C2 infrastructure, and malicious files, to support detection efforts. “Even though the malicious packages we know have been disabled in the last few hours, the attacks may continue and evolve going forward,” Plate noted.
