Two vulnerabilities in n8n’s sandbox mechanism could be exploited for remote code execution (RCE) on the host system.
JFrog security researchers have exposed two critical vulnerabilities (CVE-2026-1470, rated 9.9; and CVE-2026-0863, rated 8.5) in the n8n workflow automation platform.
Sandbox escape vulnerability in vm2, used by nearly 900 NPM packages, allows attackers to bypass security protections and ...
A critical vm2 Node.js vulnerability (CVE-2026-22709, CVSS 9.8) allows sandbox escape via Promise handler bypass.
A JavaScript sandbox bug rated CVSS 9.9 enables attackers to bypass AST‑based protections, while a Python execution bypass ...
OpenClaw patched a critical vulnerability that could be exploited to hijack the increasingly popular AI assistant.
A high-severity OpenClaw flaw allows one-click remote code execution via token theft and WebSocket hijacking; patched in ...
The GitHub Copilot SDK turns the Copilot CLI into a cross-platform agent host with Model Context Protocol support.
A new around of vulnerabilities in the popular AI automation platform could let attackers hijack servers and steal ...
A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access ...
Researchers disclose rapid exploit chain that let attackers run code via a single malicious web page Security issues continue ...
Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers ...