CVE Reportsn8n RCE: When 'Do Not Enter' is Just a Suggestion Vulnerability ID: CVE-2026-27577 CVSS...
Vulnerability ID: CVE-2026-27577
CVSS Score: 9.4
Published: 2026-02-25
A critical Remote Code Execution (RCE) vulnerability in n8n (CVE-2026-27577) allows attackers to compromise the host system by chaining a trivial authentication bypass in the ChatTrigger node with a sophisticated sandbox escape. This isn't just a minor bug; it's a full-system compromise waiting to happen for any instance exposing the LangChain integration. By exploiting a logic error in cookie validation and a parsing oversight in the Abstract Syntax Tree (AST) rewriter, attackers can execute arbitrary system commands with the privileges of the n8n process.
n8n's ChatTrigger node checked if an auth cookie existed, not if it was valid. Combined with a failure to sanitize the JavaScript spread operator (...) and Python's __objclass__ in the execution sandbox, this allows unauthenticated RCE.
1.123.22)2.9.3)2.10.1)Fix: Prevent expression sandbox escape via spread operator and property access
@@ -120,6 +120,7 @@ export class ExpressionSandbox {
+ SpreadElement: (node) => this.visitSpreadElement(node),
...
Fix: Validate auth cookie signature in GenericFunctions
@@ -45,7 +45,7 @@
- if (!authCookie && webhookName !== 'setup') {
+ if (!validateCookie(authCookie) && webhookName !== 'setup') {
Remediation Steps:
docker pull n8nio/n8n:latest
ChatTrigger nodes or unauthorized modifications.Read the full report for CVE-2026-27577 on our website for more details including interactive diagrams and full exploit analysis.