Blog

Critical n8n Vulnerabilities Expose 24,700 Startup Automation Servers to Credential Theft

Five critical n8n CVEs let attackers execute code and steal every stored credential. Here's what this means for your SOC 2 vendor risk management.

If your startup uses n8n to automate workflows between Slack, your CRM, your database, and a dozen other services, every credential stored in that instance is now a liability. On March 11, 2026, CISA added n8n to its Known Exploited Vulnerabilities catalog after researchers disclosed five critical flaws with CVSS scores ranging from 9.4 to 9.9. More than 24,700 self-hosted instances remain exposed on the public internet.

The worst part isn't the remote code execution. It's what comes after: attackers can read n8n's encryption key and decrypt every stored credential in the system. AWS keys, database passwords, OAuth tokens, API secrets for every service your workflows touch. If you connected it, they can steal it.

I've worked with startups that wire their entire operational backbone through tools like n8n. Slack notifications, customer onboarding flows, billing webhooks, deployment triggers. These platforms become the nervous system of the business. And because they need credentials to talk to everything, they become the single richest target an attacker could ask for.

What Happened: Five CVEs, One Devastating Chain

Eilon Cohen from Pillar Security discovered and reported the vulnerabilities. Here's what each one does:

CVE CVSS Type Authentication Required?
CVE-2026-27493 9.5 Unauthenticated RCE via form nodes No
CVE-2025-68613 9.9 Expression injection RCE Yes (workflow editor)
CVE-2026-27577 9.4 Expression sandbox escape Yes (workflow editor)
CVE-2026-27495 9.4 Task runner sandbox bypass Yes (workflow editor)
CVE-2026-27497 9.4 SQL injection in Merge node Yes (workflow editor)

The critical chain starts with CVE-2026-27493. n8n's Form nodes create public endpoints that accept user input - no authentication required. A double-evaluation bug in these form endpoints lets attackers inject expressions that get evaluated as code. Submit a crafted form value, get shell execution on the server. No login needed.

Once an attacker has code execution, CVE-2026-27577 makes the damage total. The expression sandbox is supposed to prevent code from accessing Node.js internals, but a missing case in the AST rewriter lets the process object slip through untransformed. With access to process, an attacker can read environment variables - including N8N_ENCRYPTION_KEY, the master key that encrypts every stored credential in n8n's database.

With the encryption key and database access (trivial once you have shell execution), the attacker decrypts everything: AWS access keys, database connection strings, OAuth refresh tokens, SMTP credentials, payment processor API keys. Every integration your n8n instance talks to is now compromised.

The Scale: 24,700 Exposed Instances and Counting

According to internet scanning data cited in CISA's KEV listing, more than 24,700 n8n instances are accessible on the public internet. The geographic breakdown:

  • North America: 12,300+
  • Europe: 7,800+
  • Rest of world: 4,600+

These numbers represent only self-hosted instances with n8n's web interface exposed to the internet. Many startups self-host n8n on a VPS or Kubernetes cluster without putting it behind a VPN or authentication proxy. The default configuration doesn't enforce authentication on all endpoints, and Form node endpoints are intentionally public.

CISA has set a remediation deadline of March 25, 2026 for federal agencies under BOD 22-01. If you're not a federal agency, that deadline still matters - it signals how seriously the government takes active exploitation of these flaws.

Why This Is a SOC 2 Problem, Not Just a Security Problem

Here's where I see startups consistently underestimate their risk: low-code and no-code automation tools like n8n, Zapier, Make, and Tray.io hold more credentials than almost any other system in the company. They're the connective tissue between every SaaS product you use. And most compliance programs treat them as an afterthought.

If you're pursuing or maintaining SOC 2 compliance, this n8n incident maps directly to several Trust Services Criteria that your auditor will evaluate:

CC9.2: Third-Party Risk Management

SOC 2 requires you to assess and monitor the risks associated with third-party service providers. n8n is a third-party component in your infrastructure, whether you self-host it or use their cloud service. Your controls need to cover:

  • Vendor assessment: Did you evaluate n8n's security posture before deploying it? Do you have a process for tracking their security advisories?
  • Ongoing monitoring: How quickly do you learn about and apply patches to third-party components? If the answer is "whenever someone remembers to check," that's a control gap.
  • Incident response integration: Does your IR plan cover scenarios where a third-party tool is compromised? Can you enumerate what credentials a compromised n8n instance would expose?

CC6.1: Logical Access Controls

Every credential stored in n8n represents a logical access path to another system. SOC 2 CC6.1 requires you to restrict logical access to information assets. If n8n holds AWS root keys, production database credentials, and payment processor tokens, and n8n itself is exposed to the internet without proper access controls, you've created an uncontrolled access path to your most sensitive systems.

The question your auditor will ask: "How do you control which systems have access to production credentials, and how do you ensure those systems are adequately protected?"

If the answer involves an n8n instance that hasn't been patched in three months and is accessible on a public IP, you have a finding.

CC7.1: Monitoring and Detection

Did your monitoring detect that your n8n instance was vulnerable? Did anyone notice when the CVEs were published? SOC 2 expects you to monitor for vulnerabilities in your environment and respond in a timely manner. For most startups, "timely" means within your defined SLA - typically 24-72 hours for critical vulnerabilities.

If you're building your SaaS compliance stack, automation tools need to be in scope for your vulnerability management program, not treated as shadow IT that sits outside your security perimeter.

The Broader Problem: Automation Tools as Credential Vaults

n8n is the incident that made the news, but the pattern is everywhere. I've audited startup environments where:

  • A Make.com (formerly Integromat) instance held credentials for 40+ services, including the production database, Stripe, AWS, and the company's Google Workspace admin account
  • A self-hosted n8n instance was running on a $5/month VPS with no firewall rules, no authentication proxy, and root credentials for three databases
  • Zapier held OAuth tokens for the CEO's Gmail, the company's Salesforce instance, and the production deployment pipeline

These tools accumulate credentials organically. Someone sets up a Slack notification workflow and connects their Slack bot token. Then they add a CRM sync and connect HubSpot. Then a billing webhook needs Stripe access. Six months later, the automation platform has more credential access than any individual employee.

And unlike a human employee, these platforms don't have MFA. They don't get security awareness training. They don't notice when something feels phishy. They just store encrypted blobs of credentials and use them whenever a workflow triggers.

What to Do Right Now: A Remediation Checklist

1. Patch Immediately

If you're running self-hosted n8n, update to one of these fixed versions today:

Current Version Range Update To
< 1.123.22 1.123.22
>= 2.0.0 and < 2.9.3 2.9.3
>= 2.10.0 and < 2.10.1 2.10.1

If you're on n8n Cloud, the patches have already been applied. Verify by checking your instance version in Settings.

2. Assume Credential Compromise If You Were Exposed

If your n8n instance was accessible on the public internet before patching, assume that every credential stored in n8n has been compromised. This means:

  • Rotate every secret stored in n8n's credential manager. Not just passwords - API keys, OAuth tokens, database connection strings, SMTP credentials, webhook secrets. All of them.
  • Check access logs for every connected service. Look for unusual API calls, data exports, or configuration changes.
  • Revoke and reissue OAuth tokens. Token rotation isn't enough if the attacker captured refresh tokens - they can generate new access tokens until the refresh token is revoked.

For a structured approach to rotating credentials at scale, I wrote a complete secrets management guide that includes an incident response playbook for exactly this scenario.

3. Stop Exposing n8n to the Public Internet

Put n8n behind a VPN or zero-trust proxy. There is no reason for n8n's web interface to be directly accessible from the internet. If you need public form endpoints, put them behind a reverse proxy that only exposes the specific form paths, not the entire application.

# Expose only form submission endpoints, not the admin UI
server {
    listen 443 ssl;
    server_name forms.yourcompany.com;

    # Only allow form webhook paths
    location /form/ {
        proxy_pass http://n8n-internal:5678;
    }

    # Block everything else
    location / {
        return 404;
    }
}

4. Implement Mitigations for Unpatched Instances

If you can't patch immediately, apply these mitigations:

  • Disable Form and FormTrigger nodes by setting the NODES_EXCLUDE environment variable:
    NODES_EXCLUDE=n8n-nodes-base.form,n8n-nodes-base.formTrigger
    
  • Restrict workflow editing permissions to a minimal set of trusted users
  • Use external runner mode (N8N_RUNNERS_MODE=external) to mitigate CVE-2026-27495
  • Restrict OS privileges - run n8n as a non-root user with no sudo access and limited filesystem permissions

5. Audit Your Credential Inventory

This is the step most teams skip, and it's the most important for compliance. Build a complete inventory of:

  • Every credential stored in n8n
  • What system each credential grants access to
  • What permission level each credential has (read-only vs. admin vs. root)
  • Whether each credential follows least-privilege principles

You'll likely find credentials with far more access than the workflow needs. A workflow that posts Slack messages doesn't need a bot token with admin scope. A workflow that reads from a database doesn't need write access. Tighten these permissions now, while you're already rotating credentials.

6. Add Automation Tools to Your Vulnerability Management Program

If your vulnerability scanning only covers your application code and servers, you're missing a critical category. Add n8n (and any other automation tools) to:

  • Your asset inventory - know what version is running and where
  • Your patch management process - subscribe to n8n's security advisories and apply patches within your SLA
  • Your access reviews - periodically audit what credentials n8n holds and whether they're still needed
  • Your incident response plan - document the blast radius if your automation platform is compromised

Lessons for Your Next SOC 2 Audit

When your auditor asks about third-party risk management, you want to show a documented process, not a scrambled response to the latest CVE. Here's what "good" looks like:

Vendor inventory: A maintained list of all third-party tools with access to production systems or customer data. n8n should be on it. So should Zapier, Make, Retool, or whatever else your team uses.

Patch management SLA: A defined timeline for applying security patches. Critical vulnerabilities (CVSS 9.0+) should have a 24-48 hour SLA. The n8n CVEs are all 9.4+.

Credential inventory: A documented record of what credentials each system holds, following secrets management best practices. If your automation tool holds production database root credentials, your auditor should see that in your risk register with appropriate compensating controls.

Access controls: n8n behind a VPN, with role-based access to workflow editing, and Form endpoints isolated from the admin interface.

Monitoring: Alerts for new CVEs affecting your third-party tools, and evidence that you respond within your SLA.

None of this is exotic. It's basic hygiene. But most startups don't apply it to their automation tools because they think of n8n as "just an internal tool" rather than a credential vault that connects to everything.

The Takeaway

The n8n vulnerabilities are severe on their own - five critical CVEs, unauthenticated RCE, full credential exfiltration. But the real lesson is structural: low-code automation platforms are invisible credential aggregators, and most security programs don't account for them.

If this incident prompts you to inventory what credentials your automation tools hold, tighten their access controls, and bring them into your vulnerability management program, you'll be in a better position than 90% of startups running the same stack. And you'll have a much better story to tell your SOC 2 auditor.

Patch first. Rotate credentials second. Fix the process third.


Keep reading:

Need help assessing your third-party vendor risk or preparing for a SOC 2 audit? Let's talk.