CriticalVulnerability

Ni8mare: Critical n8n Automation Platform Flaw Enables Complete System Takeover Without Authentication

Security researchers have uncovered a devastating vulnerability in n8n workflow automation software that allows remote attackers to seize complete control of exposed instances without any credentials. Dubbed Ni8mare, this flaw marks the fourth critical security issue discovered in the platform within just two weeks.

Evan Mael
Evan Mael
Technology21views
CVSS Score10.0
Critical CVEs4
Last Vulnerable Version1.65.0
Auth Required0
10.0

Maximum CVSS severity rating for CVE-2026-21858 - indicating the most critical possible risk level with trivial exploitation

The popular workflow automation platform n8n faces yet another maximum-severity security crisis as researchers from Cyera Research Labs reveal a devastating vulnerability enabling complete instance compromise without authentication. The flaw, assigned CVE-2026-21858 and nicknamed Ni8mare, received the highest possible CVSS rating of 10.0.

Security researcher Dor Attias initially reported the weakness on November 9, 2025. The platform maintainers acknowledged that successful exploitation could expose sensitive information stored on affected systems and potentially enable broader infrastructure compromise depending on deployment configurations.

Four Critical Flaws in Two Weeks

4

Number of critical vulnerabilities (CVSS 9.9-10.0) disclosed in n8n within just two weeks - an unprecedented security crisis for the platform

Ni8mare represents the fourth critical vulnerability disclosed in n8n within an exceptionally short timeframe, raising serious concerns about the platform's security posture:

What distinguishes Ni8mare from its predecessors is the complete absence of authentication requirements—attackers need no credentials whatsoever to compromise vulnerable systems.

Content-Type Confusion Attack Chain

When the platform receives data, a parsing function examines the Content-Type header to determine how to handle the request body. Requests marked as multipart/form-data trigger a file upload parser, while other content types follow a standard body parsing path.

The critical weakness emerges when file-handling functions execute without verifying the actual content type. Attackers can manipulate the request structure to override internal file path parameters, enabling them to read arbitrary files from the server.

Catastrophic Blast Radius for Enterprise Deployments

Workflow automation platforms occupy uniquely privileged positions within organizational infrastructure. A compromised n8n instance doesn't merely expose a single application—it potentially surrenders access to every integrated system and service.

100%

Percentage of connected service credentials potentially exposed when an n8n instance is compromised - including API keys, OAuth tokens, and database connection strings

API credentials, OAuth tokens, database connection strings, cloud storage configurations, and countless other sensitive secrets flow through these automation hubs. Attackers gaining control effectively inherit the combined permissions of every connected service, transforming a single vulnerability into enterprise-wide compromise.

Organizations exposing n8n instances to the internet face immediate risk, though internal deployments remain vulnerable to lateral movement attacks once adversaries establish initial network access.

Immediate Actions Required

Current stable releases include 1.123.10, 2.1.5, 2.2.4, and 2.3.0. Both self-hosted deployments and n8n Cloud instances require attention.

Critical

Given the severity and ease of exploitation, organizations unable to patch immediately should consider taking vulnerable instances offline until remediation becomes possible.

Frequently Asked Questions

Unlike the three other critical vulnerabilities disclosed recently, Ni8mare requires absolutely no authentication. Attackers can exploit it without any credentials, making publicly accessible instances immediately vulnerable to complete compromise.

Yes, both self-hosted deployments and n8n Cloud instances are impacted. However, n8n has released patches that should already be applied to Cloud environments. Self-hosted users must manually upgrade their installations.

Automation platforms like n8n serve as integration hubs connecting dozens of external services. Compromising the platform grants attackers access to every stored credential, API key, and OAuth token used across all connected systems—effectively multiplying the impact of a single vulnerability.

Organizations unable to patch immediately should disable public webhook and form endpoints, implement network-level restrictions to prevent internet exposure, enforce authentication on all accessible endpoints, and consider temporarily taking critical instances offline.

Incident Summary

Type
Vulnerability
Severity
Critical
Industry
Technology
Threat Actor
Unknown
Target
n8n Self-Hosted Instances, Cloud Deployments, Enterprise Automation Infrastructure
Published
Jan 8, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in