Open Nav
Sign Up

N8MARE / Ni8mare: Critical n8n Flaw Enables Unauthenticated File Access: CVE-2026-21858

cve-2026-21858

Filip Dimitrov

January 8, 2026

On January 7, 2026, n8n disclosed a critical vulnerability tracked as CVE-2026-21858 (CVSS 10.0), dubbed “Ni8mare” (often referenced as “N8MARE”). The issue can allow an unauthenticated remote attacker to access files on the underlying server when certain form-based workflows are exposed. 

Depending on what’s stored on the instance and how it’s deployed, this can cascade into credential theft, session/token forgery, and even full instance compromise. 

Affected Versions

CVE-2026-21858 affects self-hosted / locally deployed n8n instances running version ≤ 1.65.0. The fixed version is 1.121.0. Aside from patching, there are no official workarounds. Temporary mitigation is limiting or turning off public webhook/form endpoints.

Technical Overview

Ni8mare is described as a Content-Type confusion / improper request parsing issue in how n8n processes certain webhook + form-based requests. 

n8n chooses parsing logic based on the request Content-Type. Under specific conditions, an attacker can manipulate how the request is parsed so that file-related fields are processed unsafely, enabling arbitrary file access on the server.

n8n classifies the weakness under CWE-20 (Improper Input Validation).

Exploitation Conditions

You should treat this as highest urgency if any of these are true:

  • Your n8n instance is internet-facing
  • You use webhooks or forms that are reachable without authentication
  • You have workflows where external users submit data/files via a form and the workflow processes that content
  • Your instance stores high-value credentials (OAuth, API keys) or has privileged network access

n8n’s advisory is explicit that exploitation depends on “certain form-based workflows” being vulnerable/exposed.

Remediation Guidance

If you self-host n8n:

  1. Patch immediately: upgrade to n8n 1.121.0 or later. GitHub
  2. Temporarily reduce exposure: restrict/disable publicly accessible webhook and form endpoints until you patch.
  3. Assume secrets may be exposed if your instance was internet-facing and used forms/webhooks. Prioritize rotating:
    • n8n encryption/secret keys, auth/session secrets
    • OAuth tokens/API keys stored in credentials
    • DB credentials, cloud keys, CI/CD secrets referenced by workflows
  4. Hunt for suspicious webhook/form traffic and unusual workflow executions (details below).

Context: N8n Has Had Multiple Critical Bugs Recently

Ni8mare lands amid a wave of critical n8n issues disclosed in late 2025 / early 2026, including CVE-2025-68613 (CVSS 9.9) and others. This increases the chance that attackers will actively probe n8n instances and chain weaknesses where possible.

Stay Safe. Stay Secure.
OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.