Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. n8n
  4. ›
  5. CVE-2026-21893

CVE-2026-21893: n8n Vulnerable to Command Injection in Community Package Installation

February 4, 2026

A Command Injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions.

Important context

  • Exploitation requires administrative access to the n8n instance.
  • The affected functionality is restricted to trusted users who are already permitted to install third-party community packages.
  • No unauthenticated or low-privilege exploitation is possible.
  • There is no evidence of exploitation in the wild.

Because administrative users can already extend n8n with custom or community code, the vulnerability does not meaningfully expand the threat model beyond existing administrator capabilities. However, it represents a violation of secure coding practices and has therefore been addressed.

References

  • github.com/advisories/GHSA-7c4h-vh2m-743m
  • github.com/n8n-io/n8n
  • github.com/n8n-io/n8n/commit/ae0669a736cc496beeb296e115267862727ae838
  • github.com/n8n-io/n8n/security/advisories/GHSA-7c4h-vh2m-743m
  • nvd.nist.gov/vuln/detail/CVE-2026-21893

Code Behaviors & Features

Detect and mitigate CVE-2026-21893 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.187.0 before 1.120.3

Fixed versions

  • 1.120.3

Solution

Upgrade to version 1.120.3 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

npm/n8n/CVE-2026-21893.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 00:17:52 +0000.