CVE-2026-21893: n8n Vulnerable to Command Injection in Community Package Installation
A Command Injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions.
Important context
- Exploitation requires administrative access to the n8n instance.
- The affected functionality is restricted to trusted users who are already permitted to install third-party community packages.
- No unauthenticated or low-privilege exploitation is possible.
- There is no evidence of exploitation in the wild.
Because administrative users can already extend n8n with custom or community code, the vulnerability does not meaningfully expand the threat model beyond existing administrator capabilities. However, it represents a violation of secure coding practices and has therefore been addressed.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-21893 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →