Critical zero-click flaw in n8n exposed cloud and self-hosted servers to takeover

March 21, 20262 min read2 sources
Share:
Critical zero-click flaw in n8n exposed cloud and self-hosted servers to takeover

A critical vulnerability in workflow automation platform n8n could allow attackers to fully compromise both cloud-hosted and self-hosted servers without authentication, according to reporting by Infosecurity Magazine citing security research from Pillar Security.

The flaw was described as a zero-click issue, meaning exploitation did not require user interaction, and attackers reportedly did not need an n8n account to trigger it. While full technical details and version information were not included in the initial report, the impact was severe: server-level compromise in a product that often stores API keys, access tokens, workflow logic and connections to other business systems.

That makes the bug more than a single-application problem. n8n is commonly used to connect services such as cloud apps, internal APIs, databases and developer tools. If an attacker gains control of the n8n server, they may also be able to access stored credentials, alter workflows, move data, or pivot into downstream systems. For organizations exposing n8n to the internet, the risk is especially high because the reported attack path required no login at all.

At the time of writing, public reporting had not clearly confirmed a CVE ID, affected version range, or whether the flaw had been exploited in the wild. Those details matter for defenders trying to assess exposure, but the reported combination of zero-click, unauthenticated access and full server compromise places this issue in the highest-risk category.

Organizations running n8n should review vendor advisories and patch immediately if a fixed release is available. Security teams should also inspect logs for suspicious requests, review recent workflow or credential changes, and rotate secrets stored in the platform if compromise is suspected. Self-hosted deployments should not be publicly reachable unless necessary, and administrators may want to place instances behind additional access controls or a VPN while remediation is underway.

The incident is another reminder that automation platforms can become high-value targets because they centralize credentials and business logic. A single flaw in that layer can open the door to far broader compromise than a typical web app bug.

Share:

// SOURCES

// RELATED

NCA says teens are being drawn into cybercrime through online radicalization

The UK’s NCA warns that online communities are grooming some teenagers into cybercrime, turning a tech threat into a youth safeguarding issue.

2 min readMar 21

Crypto scam ShieldGuard dismantled after fake Chrome security tool was found stealing wallets

A fake Chrome crypto security extension called ShieldGuard was removed after researchers found it stole wallet data and exposed users to theft.

2 min readMar 21

MCP security risks stem from AI architecture, not a patchable bug

Researchers warn MCP introduces architectural AI security risks that standard patches cannot fix, raising enterprise concerns over tool access.

2 min readMar 21

CISA orders agencies to patch exploited Cisco SD-WAN flaws

CISA has ordered federal agencies to patch actively exploited Cisco SD-WAN flaws that can hand attackers admin access to network infrastructure.

2 min readMar 21