A maximum-severity flaw in n8n automation software enables complete system takeover without authentication, exposing organizations to GDPR/CCPA violations through potential data breaches.
Security researchers have uncovered a critical vulnerability in the n8n automation platform that allows unauthenticated attackers to execute remote code and seize control of servers. Tracked as CVE-2026-21858 and rated 10.0 on the CVSS scale, the flaw affects an estimated 100,000 self-hosted instances.

The vulnerability stems from how n8n processes webhooks, enabling attackers to manipulate HTTP headers and overwrite internal variables. This grants access to sensitive files and escalates to full system control. Compromised systems expose API credentials, customer databases, payment processors, and cloud storage connections – precisely the data protected under GDPR Article 32 and CCPA Section 1798.150.
Organizations running unpatched versions face severe compliance consequences. GDPR violations could trigger fines up to 4% of global annual turnover, while CCPA permits statutory damages of $7500 per intentional violation. The central role of n8n in workflow automation compounds the risk, as a single breach potentially compromises an organization's entire digital infrastructure.
n8n released patched version 1.121.0 on November 18, 2025. Companies must immediately upgrade installations to avoid regulatory penalties and prevent unauthorized access to personal data. Security teams should audit all automation workflows for stored credentials and assume compromised systems require full incident response procedures under breach notification laws.

Comments
Please log in or register to join the discussion