January 7 Advisory: n8n Unauthenticated Remote Code Execution (NI8MARE) [CVE-2026-21858]

Rapid Response

Vulnerability Description

CVE-2026-21858 is a critical unauthenticated remote code execution (RCE) vulnerability in n8n, a widely used workflow automation platform. The vulnerability allows a remote attacker with no authentication to execute arbitrary system commands by abusing workflow execution and credential handling logic, resulting in full compromise of the underlying host. This includes the ability to deploy malware, steal secrets, and pivot laterally. The issue affects n8n versions prior to 1.121.0 with the highest risk observed in self-hosted, internet-exposed deployments, including Docker-based installations.

Jan-7-advisory-report.png
Map of exposed hosts

See the full breakdown by country in Censys Platform → 

FieldDescription
CVE-IDCVE-2026-21858 – CVSS score: 10 – assigned by GitHub
Vulnerability DescriptionA critical unauthenticated remote code execution (RCE) vulnerability in n8n, that allows a remote attacker with no authentication to execute arbitrary system commands by abusing workflow execution and credential handling logic, resulting in full compromise of the underlying host. This includes the ability to deploy malware, steal secrets, and pivot laterally. 
Date of DisclosureJanuary 7, 2026
Affected Assetsn8n automation workflow instances.
Vulnerable Software VersionsVersions below 1.121.0.

Particularly impacts self-hosted and internet-exposed n8n deployments, including Docker-based installations.
PoC AvailableYes — public technical details and proof-of-concept exploitation steps are available in the Cyera Research Labs write-up.
Exploitation StatusNo confirmed large-scale exploitation reported at disclosure time.

Given the unauthenticated RCE nature and simplicity of exploitation, rapid weaponization is considered likely.
Patch statusn8n has released security updates addressing the issue in version 1.121.0.

Organizations should upgrade immediately to the latest patched release provided by n8n.

Internet-exposed n8n instances should be restricted or taken offline until patched.

Censys Perspective

As of time of writing, Censys observes 26,512 exposed hosts, trackable with the following Censys queries: 

Platform:

host.services: (software.product: "n8n" and software.version < "1.121.0") or web.software: (product: "n8n" and version < "1.121.0")

ASM risk query:

risks.name="Vulnerable n8n (Ni8mare) [CVE-2026-21858]"

Legacy Search:

services.software: (product: "n8n" and version: {* to 1.121.0})

Subscribe to our blog