A critical zero-click vulnerability has been discovered in n8n, a popular workflow automation tool, allowing attackers to compromise entire servers without requiring authentication or an n8n account. This flaw affects both cloud and self-hosted n8n instances, making it a significant threat to users. The vulnerability can be exploited without any user interaction, making it particularly dangerous. As a result, attackers can gain full control over the server, potentially leading to data breaches and other malicious activities. The fact that no authentication is required to exploit this flaw makes it especially concerning, as it can be exploited by anyone with knowledge of the vulnerability1. This vulnerability poses a significant risk to n8n users, and practitioners should take immediate action to patch their systems to prevent potential attacks, as the lack of authentication required for exploitation makes it a highly attractive target for malicious actors.
Critical Zero-Click Flaw in n8n Allows Full Server Compromise
⚠️ Critical Alert
Why This Matters
The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited
References
- Infosecurity Magazine. (2026, March 12). Critical Zero-Click Flaw in n8n Allows Full Server Compromise. *Infosecurity Magazine*. https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/
Original Source
Infosecurity Magazine
Read original →