Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-21858.yaml | POC Details |
| 2 | A maximum severity vulnerability dubbed "Ni8mare" allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation platform. | https://github.com/eduardorossi84/CVE-2026-21858-POC | POC Details |
| 3 | n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0) | https://github.com/Chocapikk/CVE-2026-21858 | POC Details |
| 4 | CVE-2026-21858 | https://github.com/Ashwesker/Ashwesker-CVE-2026-21858 | POC Details |
| 5 | Comprehensive vulnerability detection tool for n8n workflow automation instances. Detects the critical CVE-2026-21858 vulnerability (CVSS 10.0) without performing any exploitation. | https://github.com/cropnet/ni8mare-scanner | POC Details |
| 6 | SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit | https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit | POC Details |
| 7 | Comprehensive vulnerability detection tool for n8n workflow automation instances. Detects the critical CVE-2026-21858 vulnerability (CVSS 10.0) without performing any exploitation. | https://github.com/cropnet/Ni8mare | POC Details |
| 8 | None | https://github.com/sec-dojo-com/CVE-2026-21858 | POC Details |
| 9 | Proof of Concept: CVE-2026-21858 is vulnerability on n8n where unauthenticated remote attackers can access sensitive files. | https://github.com/SystemVll/CVE-2026-21858 | POC Details |
| 10 | CVE-2026-21858 | https://github.com/bgarz929/Ashwesker-CVE-2026-21858 | POC Details |
| 11 | Hack | https://github.com/Alhakim88/CVE-2026-21858 | POC Details |
| 12 | None | https://github.com/EQSTLab/CVE-2026-21858 | POC Details |
| 13 | CVE-2026-21858 | https://github.com/zaryouhashraf/CVE-2026-21858 | POC Details |
| 14 | None | https://github.com/bamov970/CVE-2026-21858 | POC Details |
| 15 | https://github.com/vulhub/vulhub/blob/master/n8n/CVE-2026-21858/README.md | POC Details | |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/n8n%20Content-Type%20%E6%B7%B7%E6%B7%86%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E8%87%B3%20RCE%20%E6%BC%8F%E6%B4%9E%20CVE-2026-21858.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet