{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreihpyxzmurgtyaytpc7s2uacykdv4crpdfhz6pjnffpbbrment3k4u",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mgsbxcscp7o2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiaxtxqzyxene5yv6zn6qvweiwh7vnf2huguo6pjm454lp3xqewvjq"
},
"mimeType": "image/jpeg",
"size": 636284
},
"path": "/2026/03/critical-n8n-flaws-allow-remote-code.html",
"publishedAt": "2026-03-11T14:51:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution.\nThe vulnerabilities are listed below -\n\nCVE-2026-27577 (CVSS score: 9.4) - Expression sandbox escape leading to remote code execution (RCE)\nCVE-2026-27493 (CVSS score: 9.5) - Unauthenticated",
"title": "Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials"
}