{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-21893","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-05T17:24:36.929Z","datePublished":"2026-02-04T17:36:51.690Z","dateUpdated":"2026-02-04T19:33:50.547Z"},"containers":{"cna":{"title":"n8n Vulnerable to Command Injection in Community Package Installation","problemTypes":[{"descriptions":[{"cweId":"CWE-78","lang":"en","description":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-20","lang":"en","description":"CWE-20: Improper Input Validation","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","baseScore":9.4,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"references":[{"name":"https://github.com/n8n-io/n8n/security/advisories/GHSA-7c4h-vh2m-743m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/n8n-io/n8n/security/advisories/GHSA-7c4h-vh2m-743m"},{"name":"https://github.com/n8n-io/n8n/commit/ae0669a736cc496beeb296e115267862727ae838","tags":["x_refsource_MISC"],"url":"https://github.com/n8n-io/n8n/commit/ae0669a736cc496beeb296e115267862727ae838"}],"affected":[{"vendor":"n8n-io","product":"n8n","versions":[{"version":">= 0.187.0, < 1.120.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-04T17:36:51.690Z"},"descriptions":[{"lang":"en","value":"n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3."}],"source":{"advisory":"GHSA-7c4h-vh2m-743m","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-04T19:33:16.360319Z","id":"CVE-2026-21893","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-04T19:33:50.547Z"}}]}}