Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2026-21858: Critical Unauthenticated File Access Vulnerability in n8n “Ni8mare”

On January 7, 2026, fixes were released for a maximum severity vulnerability (CVE-2026-21858) impacting n8n, a workflow automation application primarily used with artificial intelligence.
Arctic Wolf Security Bulletin
6 min read

On January 7, 2026, fixes were released for a maximum severity vulnerability (CVE-2026-21858) impacting n8n, a workflow automation application primarily used with artificial intelligence. Labeled “Ni8mare” by the researchers who discovered it, the vulnerability allows unauthenticated remote threat actors to take over locally deployed instances via publicly accessible webhook and form endpoints. 

The vulnerability can be exploited by bypassing the file upload parser through a non-multipart content type, granting control over file metadata, including file paths. This enables arbitrary local file read and injection into workflows, exposing sensitive data (such as API keys, OAuth tokens, database credentials, and session cookies). In some deployments, this may also lead to authentication bypass or arbitrary command execution, depending on configuration and workflow usage. 

While exploitation of CVE-2026-21858 has not been observed at the time of this writing, threat actors are likely to gain interest in this vulnerability due to its widespread use (an estimated ~100,000 servers globally are impacted by this vulnerability) and the level of access that could be obtained upon compromise. 

Recommendations for CVE-2026-21858

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product  Affected Version  Fixed Version 
n8n 
  • 1.65.0 and later 
  • Versions prior to 1.121.0 
1.121.0 or later 

 

Please follow your organization’s patching and testing guidelines to minimize potential operational impact. 

Workaround (Optional)

  • For users unable to apply the patch, n8n developers recommend restricting or disabling publicly accessible webhook and form endpoints as a temporary mitigation until the upgrade is completed. 

References 

Share this post: