Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026030209034040 | Publication Time | 2026/03/02 09:44 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/03/02 09:44 |
| Impact Level | Low | ||
| [Subject] [Vulnerability Alert] Four Critical Security Vulnerabilities Identified in SolarWinds Serv-U Software |
|||
|
[Content] 【CVE-2026-27495, CVSS: 9.4】 This vulnerability allows an authenticated attacker with permission to own or modify workflows to exploit a vulnerability in the JavaScript task execution sandbox and execute arbitrary code outside the sandbox boundary. 【CVE-2026-27493, CVSS: 9.5】 This is a second-order expression injection vulnerability. An unauthenticated attacker can inject and execute arbitrary n8n expressions through specially crafted form data. When combined with the expression sandbox escape mechanism, it may lead to remote code execution on the n8n host. 【CVE-2026-27577, CVSS: 9.4】 This vulnerability allows an authenticated attacker with permission to create or modify workflows to exploit specially crafted workflow parameter expressions, triggering unauthorized system commands on the n8n host during execution. 【CVE-2026-27498, CVSS: 9.0】 This vulnerability allows an authenticated attacker with permission to create or modify workflows to leverage Git operations linked to the “Read/Write Files from Disk” node, which may result in remote code execution. |
|||
|
[Affected Platform] 【CVE-2026-27498】 n8n versions prior to 1.123.8, n8n versions prior to 2.2.0 |
|||
|
[Recommended Actions] 【CVE-2026-27498】 Please update to the following versions: n8n version 1.123.8 and later versions, n8n version 2.2.0 and later versions |
|||
| [Reference] https://www.twcert.org.tw/tw/cp-169-10739-e7e58-1.html |
|||