CVE-2026-27577: n8n: Expression Sandbox Escape Leads to RCE
(updated )
Additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n.
References
- docs.n8n.io/hosting/securing/overview
- github.com/advisories/GHSA-vpcf-gvg4-6qwr
- github.com/n8n-io/n8n
- github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6
- github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e
- github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
- github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr
- nvd.nist.gov/vuln/detail/CVE-2026-27577
Code Behaviors & Features
Detect and mitigate CVE-2026-27577 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →