CVE-2026-21893 PUBLISHED

n8n Vulnerable to Command Injection in Community Package Installation

Assigner: GitHub_M
Reserved: 05.01.2026 Published: 04.02.2026 Updated: 04.02.2026

n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor n8n-io
Product n8n
Versions
  • Version >= 0.187.0, < 1.120.3 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE
  • CWE-20: Improper Input Validation CWE