fromSecurityWeek
3 days agoInformation security
Critical N8n Vulnerabilities Allowed Server Takeover
Two critical vulnerabilities in n8n allowed unauthenticated remote code execution and sandbox escape, potentially exposing all stored credentials including AWS keys, passwords, OAuth tokens, and API keys.