Skip to content
Product

n8n's February 2026: 19 CVEs, 6 Critical, and Why It's Time to Migrate

n8n disclosed 19 security vulnerabilities in February 2026 — including 6 critical with 3 independent RCE vectors. National cybersecurity agencies issued formal advisories. Here's what happened and how to migrate.

JT
JieGou Team
· · 5 min read

In February 2026, n8n published two security bulletins disclosing a combined 19 vulnerabilities — including 6 critical (CVSS 9.4+) and 3 independent remote code execution attack surfaces. National cybersecurity agencies — Singapore’s CSA and Canada’s CCCS — have issued formal advisories.

This isn’t a patching problem. It’s a structural architecture problem across multiple n8n subsystems.

February 6: The first wave — 8 CVEs

The month started with n8n’s February 6 bulletin disclosing 8 vulnerabilities, including the already-known expression evaluation RCE and a critical new development: CVE-2026-25049 (CVSS 9.4), which bypassed the December 2025 fix for the original CVSS 10.0 expression injection RCE.

The bypass proved this was not a one-time bug — it was evidence of a fundamental design flaw in n8n’s expression evaluation engine. Point fixes address specific attack vectors but leave the underlying architecture vulnerable to new exploitation techniques.

February 25: 11 more CVEs — 3 critical

Three weeks later, n8n published a second bulletin with 11 additional vulnerabilities, including 3 new critical-severity issues:

CVESeverityDescription
CVE-2026-27497Critical (9.4)SQL query mode allows arbitrary code execution on the n8n server
CVE-2026-27577Critical (9.4)Expression sandbox escape — system commands via manipulated parameters
CVE-2026-27495Critical (9.4)JavaScript task runner sandbox breakout — arbitrary code execution
CVE-2026-27578HighStored XSS
CVE-2026-27493HighUnauthenticated expression evaluation via Form Node
+ 6 moreHigh/MediumChat auth bypass, SSO bypass, SQL injection (MySQL/PostgreSQL/MSSQL), webhook forgery

Three independent RCE vectors in one month

The February 25 bulletin is particularly alarming because it reveals three completely independent paths to remote code execution:

  1. Expression evaluation — The sandbox designed to safely evaluate user expressions can be escaped, allowing arbitrary system command execution. This is the same subsystem that produced the December 2025 RCE and the February bypass — now with a new escape technique.

  2. SQL query mode — The SQL execution engine allows arbitrary code execution on the n8n server. This is an entirely separate subsystem from expression evaluation.

  3. JavaScript task runner — The sandboxed JavaScript execution environment can be broken out of, allowing arbitrary code execution. Again, a completely separate subsystem.

Each of these represents a distinct attack surface in a different part of n8n’s architecture. Patching one does not protect against the others. An attacker only needs to find one.

National cybersecurity agencies respond

The severity of n8n’s February disclosures prompted formal advisories from national cybersecurity agencies:

  • Singapore CSA (Cyber Security Agency of Singapore) — Issued advisory for n8n vulnerabilities
  • Canadian CCCS (Canadian Centre for Cyber Security) — Issued advisory for n8n vulnerabilities

When national governments issue warnings about your automation platform, the urgency is clear. These are the same agencies that issue advisories for critical infrastructure vulnerabilities.

Why patching isn’t enough

The pattern across February tells a clear story:

  • February 6: 8 CVEs including a bypass of the December 2025 patch
  • February 25: 11 more CVEs across three separate subsystems
  • Combined: 19 CVEs, 6 critical, 3 independent RCE vectors

This is not a case where applying the latest patch resolves the risk. The vulnerabilities span:

  • Expression evaluation engine
  • SQL query execution engine
  • JavaScript task runner sandbox
  • Authentication and SSO systems
  • Form evaluation endpoints
  • Database connectors (MySQL, PostgreSQL, MSSQL)
  • Webhook handling

The breadth suggests systemic architecture-level security issues, not isolated bugs.

The February 2026 CVE summary

MetricCount
Total CVEs in February 202619
Critical severity (CVSS 9.4+)6
Independent RCE vectors3
National agency advisories2 (Singapore CSA, Canadian CCCS)
Patch rounds in February2 (Feb 6 + Feb 25)
Exposed instances (Censys)26,512

Patches available: n8n 2.10.1, 2.9.3, 1.123.22. All self-hosted instances should upgrade immediately.

The migration path

JieGou’s n8n import wizard converts your n8n workflow JSON exports to JieGou workflows automatically:

  1. Export your n8n workflows (Settings → Export All Workflows)
  2. Upload the JSON to JieGou’s import wizard
  3. Review the conversion — 47+ node type mappings handled automatically
  4. Deploy with managed hosting, zero patching, and SOC 2-ready compliance infrastructure

The import tool maps n8n nodes to JieGou steps:

  • Set / Code / Function → LLM Step
  • IF / Switch / Filter → Condition Step
  • SplitInBatches → Loop Step
  • HTTP Request → LLM + MCP Tool
  • Slack / Gmail / GitHub → LLM + MCP Server
  • Webhook → Webhook Trigger

Security comparison

DimensionJieGoun8n
CVEs (Feb 2026)019 total, 6 critical
RCE vectorsN/A3 independent
Government advisoriesNone neededSingapore CSA, Canadian CCCS
Exposed instancesN/A (cloud + VPC)26,512
SOC 2Tech complete, 15 policies, audit pendingNot available
Encryption at restAES-256-GCM (BYOK)Not included (community)
RBAC6 roles, 20 permissionsBasic (admin / editor)
Audit logging30 action types, immutableNot included (community)
GDPRData export + deletion endpointsNot available

Start migrating

19 vulnerabilities in one month. Three independent remote code execution attack surfaces. National cybersecurity agencies issuing formal advisories.

If you’re running n8n — especially self-hosted — the risk profile has fundamentally changed.

  1. Import your n8n workflows — automated import with 47+ node mappings
  2. Read the migration guide — step-by-step technical walkthrough
  3. Compare JieGou vs. n8n — full feature and security comparison
n8n security CVE migration RCE enterprise compliance
Share this article

Enjoyed this post?

Get workflow tips, product updates, and automation guides in your inbox.

No spam. Unsubscribe anytime.