About 34,000 results
Open links in new tab
  1. Max severity Ni8mare flaw lets hackers hijack n8n servers

    1 day ago · A maximum severity vulnerability dubbed "Ni8mare" allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation …

  2. Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE ...

    2 days ago · Cyera Research Labs has discovered a "worst-case scenario" flaw in n8n, the industry-leading platform for AI and workflow automation. Dubbed "Ni8mare," this vulnerability …

  3. Critical RCE flaw allows full takeover of n8n AI workflow ...

    16 hours ago · ‘A compromised n8n instance doesn’t just mean losing one system — it means handing attackers the keys to everything,’ security researchers wrote of the 10.0 severity …

  4. Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated ...

    21 hours ago · A critical CVSS 10.0 vulnerability in n8n allows unauthenticated attackers to read files, bypass authentication, and gain full server control.

  5. The Ni8mare Scenario: Critical n8n Vulnerability Grants Full ...

    11 hours ago · Once administrative control is secured, the integration of an “Execute Command” node provides a gateway to Remote Code Execution (RCE). Cyera emphasizes that n8n …

  6. Ni8mare flaw gives unauthenticated control of n8n instances

    14 hours ago · The flaw, dubbed Ni8mare by Cyera researchers who discovered the vulnerability, lets unauthenticated attackers fully compromise affected instances. n8n is a workflow …

  7. January 7 Advisory: n8n Unauthenticated Remote Code Execution ...

    Vulnerability Description CVE-2026-21858 is a critical unauthenticated remote code execution (RCE) vulnerability in n8n, a widely used workflow automation platform. The vulnerability …