banner logoJoin us at RSAC™ 2026 Conference, March 23–March 26 | North Expo, Booth N-5863Join us at RSAC™ 2026, March 23–March 26Learn More
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-27493

CVE-2026-27493: n8n Workflow Automation RCE Vulnerability

CVE-2026-27493 is a remote code execution flaw in n8n workflow automation platform caused by second-order expression injection in Form nodes. This article covers the technical details, affected versions, and mitigation steps.

Published: February 27, 2026

CVE-2026-27493 Overview

CVE-2026-27493 is a second-order expression injection vulnerability in n8n, an open source workflow automation platform. The vulnerability exists in n8n's Form nodes and allows an unauthenticated attacker to inject and evaluate arbitrary n8n expressions by submitting crafted form data. When chained with an expression sandbox escape, this vulnerability can escalate to remote code execution on the n8n host.

The attack requires a specific workflow configuration: a form node with a field interpolating a value provided by an unauthenticated user, where the field value begins with an = character. This prefix causes n8n to treat the input as an expression, triggering double-evaluation of the field content. While the preconditions are narrow, successful exploitation can result in complete compromise of the n8n instance.

Critical Impact

Unauthenticated attackers can achieve remote code execution on n8n hosts by exploiting expression injection in Form nodes, potentially leading to complete system compromise.

Affected Products

  • n8n versions prior to 2.10.1
  • n8n versions prior to 2.9.3
  • n8n versions prior to 1.123.22

Discovery Timeline

  • 2026-02-25 - CVE CVE-2026-27493 published to NVD
  • 2026-02-25 - Last updated in NVD database

Technical Details for CVE-2026-27493

Vulnerability Analysis

This Code Injection vulnerability (CWE-94) affects n8n's Form node processing logic. The root issue lies in how n8n handles user-submitted form data that begins with an equals sign (=). When n8n encounters this character at the start of a field value, it interprets the content as an expression rather than a literal string, leading to unintended expression evaluation.

The vulnerability is categorized as a second-order injection because the malicious payload is first stored in the form submission, then later evaluated when the form data is processed by the workflow. This two-stage attack allows unauthenticated users to inject expressions that access data within n8n's expression context, including potentially sensitive workflow data and configurations.

While the expression injection alone is limited to data accessible within the n8n expression context, the critical escalation path involves chaining this vulnerability with a sandbox escape. If an attacker can break out of n8n's expression sandbox, they can achieve arbitrary code execution on the host system running n8n.

Root Cause

The vulnerability stems from insufficient input sanitization in n8n's Form node implementation. Specifically, the application fails to properly sanitize or escape user-controlled input before evaluating it as an expression. When a form field value begins with =, n8n's expression parser processes the entire string as an evaluatable expression, enabling double-evaluation attacks where attacker-controlled data is executed as code.

Attack Vector

The attack requires network access to a vulnerable n8n instance with an exposed form. The attacker must:

  1. Identify a Form node in a workflow that interpolates user-submitted values
  2. Submit form data where a field value begins with = followed by malicious n8n expression syntax
  3. The expression is evaluated in the context of the n8n workflow, allowing data exfiltration or further exploitation
  4. When combined with a sandbox escape vulnerability, escalate to remote code execution

The security patch addresses this by improving input sanitization. Below is the relevant fix from the commit:

typescript
	const sanitizedShowWelcomeScreen = !!showWelcomeScreen;
	const sanitizedAllowFileUploads = !!allowFileUploads;
-	const sanitizedAllowedFilesMimeTypes = allowedFilesMimeTypes?.toString() ?? '';
+	const sanitizedAllowedFilesMimeTypes = sanitizeUserInput(allowedFilesMimeTypes?.toString() ?? '');
	const sanitizedCustomCss = sanitizeHtml(`<style>${customCss?.toString() ?? ''}</style>`, {
		allowedTags: ['style'],
		allowedAttributes: false,

Source: GitHub Commit Change

Additionally, the patch improves authentication handling to prevent unauthorized access:

typescript
-		const authCookie = getCookie('n8n-auth');
-		if (!authCookie && webhookName !== 'setup') {
-			// Data is not defined on node so can not authenticate
-			throw new ChatTriggerAuthorizationError(500, 'User not authenticated!');
+			const authCookie = getCookie('n8n-auth');
+			if (!authCookie) {
+				throw new ChatTriggerAuthorizationError(401, 'User not authenticated!');
+			}

Source: GitHub Commit Change

Detection Methods for CVE-2026-27493

Indicators of Compromise

  • Form submissions containing field values starting with = followed by n8n expression syntax (e.g., ={{ $env.SECRET }})
  • Unexpected n8n expression evaluation errors in application logs
  • Unusual data access patterns or exfiltration attempts from n8n workflows
  • Evidence of sandbox escape attempts following form submissions

Detection Strategies

  • Monitor n8n form submission logs for payloads containing expression injection patterns such as ={{, =$, or other n8n expression syntax
  • Implement web application firewall (WAF) rules to detect and block form submissions with suspicious expression-like content
  • Review n8n workflow execution logs for unexpected expression evaluations or errors indicating injection attempts
  • Deploy endpoint detection to identify signs of code execution following form processing

Monitoring Recommendations

  • Enable verbose logging on n8n instances to capture detailed form submission data
  • Configure alerting for authentication errors (401 responses) on form endpoints that may indicate exploitation attempts
  • Monitor for unusual process spawning or network connections from n8n worker processes
  • Regularly audit Form node configurations for fields that interpolate user-submitted values

How to Mitigate CVE-2026-27493

Immediate Actions Required

  • Upgrade n8n to version 2.10.1, 2.9.3, or 1.123.22 (or later) immediately
  • Review all existing workflows using Form nodes for potentially vulnerable configurations
  • Audit form submissions for any evidence of prior exploitation attempts
  • If exploitation is suspected, rotate any credentials or secrets accessible from n8n workflows

Patch Information

n8n has released security patches addressing this vulnerability. Upgrade to one of the following versions:

  • n8n version 2.10.1
  • n8n version 2.9.3
  • n8n version 1.123.22

For detailed information about the vulnerability, refer to the GitHub Security Advisory GHSA-75g8-rv7v-32f7.

Workarounds

  • Review usage of Form nodes manually for fields that interpolate user-submitted values, particularly those prefixed with =
  • Disable the Form node by adding n8n-nodes-base.form to the NODES_EXCLUDE environment variable
  • Disable the Form Trigger node by adding n8n-nodes-base.formTrigger to the NODES_EXCLUDE environment variable
  • Restrict network access to n8n instances to trusted users only until patching is complete
bash
# Disable vulnerable nodes as temporary mitigation
export NODES_EXCLUDE="n8n-nodes-base.form,n8n-nodes-base.formTrigger"

# Restart n8n to apply the configuration
systemctl restart n8n

Note: These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures until upgrading is possible.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechN8n

  • SeverityCRITICAL

  • CVSS Score9.5

  • EPSS Probability0.14%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94
  • Technical References
  • GitHub Commit Change

  • GitHub Issue Discussion

  • GitHub Release n8n@1.123.22

  • GitHub Release n8n@2.10.1

  • GitHub Release n8n@2.9.3

  • GitHub Security Advisory GHSA-75g8-rv7v-32f7
  • Related CVEs
  • CVE-2026-27577: n8n Workflow Automation RCE Vulnerability

  • CVE-2026-27498: n8n Workflow Automation RCE Vulnerability

  • CVE-2026-27495: n8n Workflow Automation RCE Vulnerability

  • CVE-2026-27494: n8n Workflow Automation RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use