Researchers discovered malicious npm packages posing as n8n integrations, exfiltrating OAuth tokens and API keys from ...
Malicious npm packages posing as n8n community nodes were used to steal OAuth tokens by abusing trusted workflow integrations ...
CVE-2026-21858, a critical n8n vulnerability, can be exploited for unauthenticated remote code execution, leading to instance ...
Pakistan’s National CERT warns of a critical n8n flaw CVE-2026-21858, allowing remote code execution and full system ...
The National Computer Emergency Response Team (National CERT) has issued a critical advisory warning organizations about a ...
Security researchers at Cyera have discovered a critical vulnerability in n8n, the popular workflow automation platform. The ...
A critical CVSS 10.0 vulnerability in n8n allows unauthenticated attackers to read files, bypass authentication, and gain ...
Nearly 60,000 n8n instances exposed online remain unpatched against a maximum-severity vulnerability dubbed "Ni8mare." ...
A compromised n8n instance doesn’t just mean losing one system — it means handing attackers the keys to everything,’ security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results