The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account ...
Two critical-severity n8n vulnerabilities could have led to unauthenticated remote code execution, sandbox escape, and credential theft.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies on Wednesday to patch their systems against an actively exploited n8n vulnerability. n8n is an open-source ...
CISA adds n8n RCE flaw CVE-2025-68613 to KEV after active exploitation; 24,700 exposed instances raise compromise risk.
A weakness in the configuration of OAuth credentials opens up a stored XSS vulnerability in the n8n automation platform, researchers at Imperva have discovered. Setting up OAuth allows n8n to connect ...
Five Sigma embeds n8n workflow automation into its AI claims platform, giving claims teams no-code control over ...
Telus Digital data breach, vulnerabilities in Linux AppArmor allow root privileges, US defense contractor behind Coruna exploits.
FileSpin, the AI-native digital asset management (DAM) company, today announced its MCP-native agentic DAM infrastructure, built around the Model Context Protocol from the ground up, enabling AI ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results