Critical Advisory: n8n RCE Vulnerability (CVE-2026-21858) Exposes Automation Pipelines
A critical RCE (CVSS 10.0) in n8n exposes automation pipelines and stored secrets to full compromise—upgrade to version 1.36.1 immediately.
A critical RCE (CVSS 10.0) in n8n exposes automation pipelines and stored secrets to full compromise—upgrade to version 1.36.1 immediately.

Urgent: Unpatched n8n instances are open doors to your entire tech stack.
For many DevOps and IT teams, n8n is the invisible engine that runs the business—automating everything from customer onboarding to infrastructure provisioning. Because of this role, n8n instances are often trusted with highly sensitive credentials: database passwords, cloud provider API keys, and OAuth tokens.
This is why CVE-2026-21858 is a nightmare scenario.
This critical RCE flaw allows an attacker to bypass authentication safeguards, execute arbitrary code, and manipulate workflows. Once inside, they don't just compromise the n8n server; they gain access to every service that n8n is connected to.
This isn't just an application vulnerability; it is a supply chain bridge into your private data.
Secondary Vulnerabilities Identified:
Alongside the primary RCE, three high-severity vulnerabilities were also disclosed:
If exploited, an attacker can:
It is mandatory that your security personnel act as if there is a real fire during this drill.
Update your n8n Docker containers or npm packages to v1. 36. 1+ immediately.
Note: Verify the integrity of your database backups before applying the update.
If you cannot upgrade immediately:
If your instance was exposed to the internet and unpatched, assume your stored credentials are compromised.
Review n8n execution logs for workflows you do not recognize, or legitimate workflows that have been modified to include "HTTP Request" nodes sending data to unknown external IPs.
This n8n advisory highlights the dangerous gap in the "Shift-Left" philosophy. You can scan your code all you want, but if a third-party tool you rely on for operations (like n8n) introduces a runtime RCE, your static checks won't save you.
This is the Headcount Gap Crisis in action - security teams lack the capacity to respond to every critical vulnerability at the speed threats demand. Security teams are drowning in thousands of low-fidelity alerts, while a critical infrastructure flaw like this requires immediate, high-context attention.
Instead of waiting for a human analyst to read this blog post, Secure.com's Digital Security Teammate would have already:

Pre-production checks cannot secure a dynamic cloud. Find out how AI bridges the visibility gap between deployment and defense to catch what Shift-Left misses.

Misconfigurations are the #1 cause of cloud breaches—discover how to move from "finding" them to "fixing" them with AI-driven guardrails.

A new vulnerability allowed attackers to manipulate Google Gemini into leaking private data simply by embedding malicious text in a calendar invitation.