Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – February 6, 2026

Malware Activity

Understanding Recent Cyber Threats Targeting Servers and Security Systems


Threat Actor Activity

Asia State-Sponsored Cyberespionage Shadow Campaign Targets Critical Infrastructure Globally


Vulnerabilities

Patch Bypass in n8n Enables Remote Code Execution and Full Server Compromise Risk

Multiple critical vulnerabilities in the n8n workflow automation platform expose organizations to severe compromise scenarios by allowing authenticated users with workflow permissions to escape the application sandbox and execute arbitrary system commands on the host server. The flaw attack chain, collectively tracked as

, stems from inadequate sanitization and incomplete AST-based sandboxing of user-written JavaScript expressions, effectively bypassing protections introduced for the earlier and highlighting a deeper mismatch between TypeScript’s compile-time checks and JavaScript’s runtime behavior that attackers can exploit to evade security controls. Researchers demonstrated that successful exploitation could grant filesystem access, enable credential and API key theft, facilitate lateral movement into internal and cloud environments, hijack AI workflows, and potentially expose data across tenants in multi-tenant deployments (particularly when combined with publicly accessible webhooks that allow remote triggering of malicious workflows). Security experts state that “if you can create a workflow, you can own the server,” underscoring the low barrier to exploitation once privileges are obtained. Additional critical flaws (including command injection in the Git node, arbitrary file write via the Merge node, stored cross-site scripting enabling session hijacking, and a path traversal bug that could lead to RCE on downstream systems) further expand the attack surface and reinforce concerns about systemic input validation weaknesses within automation features. Although there are no confirmed reports of widespread exploitation, researchers caution that workflow automation platforms increasingly represent high-value infrastructure targets due to their deep integrations with sensitive systems and credentials. CTIX analysts strongly advise organizations to upgrade to patched versions (1.123.17 and 2.5.2 or later), rotate encryption keys and stored secrets, audit workflows for suspicious expressions, restrict workflow creation to trusted users, and deploy hardened environments to reduce the likelihood and impact of compromise.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with