n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.
https://www.databreachtoday.com/no-rest-in-2026-as-patch-alerts-amass-for-cisco-hpe-n8n-a-30482
https://www.theregister.com/2026/01/08/n8n_rce_bug/
https://www.securityweek.com/critical-vulnerability-exposes-n8n-instances-to-takeover-attacks/
https://www.infosecurity-magazine.com/news/maximum-severity-ni8mare-bug/
https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
Published: 2026-01-08
Updated: 2026-01-12
Named Vulnerability: Ni8mare
Base Score: 9.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N
Severity: High
Base Score: 10
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Severity: Critical
EPSS: 0.0003
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored