n8n vulnerability
Critical n8n Vulnerabilities Expose 100,000+ Workflow Automation Servers to Complete Takeover
If your organization uses n8n for workflow automation, stop what you're doing and read this. Researchers disclosed details today of a maximum-severity vulnerability that allows unauthenticated attackers to gain complete control over n8n instances—no credentials required. The vulnerability, tracked as CVE-2026-21858 and dubbed "Ni8mare" by