n8n Webhooks Under Threat as Attackers Orchestrate Malware Delivery via Phishing

 

A security researcher has identified a critical flaw in the open-source workflow orchestration platform n8n, which is increasingly embedded in enterprise and AI-driven operations, that highlights the fragility of modern automation ecosystems. 
The vulnerability, CVE-2026-21858, has been assigned the highest severity rating and exposes tens of thousands of deployments to potential compromise because of a subtle yet dangerous “content-type confusion” vulnerability. 
A Cyera study found that this flaw enables attackers to bypass the intended automation controls altogether, effectively turning trusted workflows into unprotected execution paths. In addition to serving as a connector between enterprise applications and advanced AI models such as GPT-4 and Claude, platforms such as n8n and Zapier have also become increasingly appealing targets due to their increasing capacity to orchestrate business logic.

These engines were previously designed for integrating tools like Slack, Gmail, and Google Sheets, but may now find themselves being utilized for coordinated malicious campaigns, including large-scale phishing operations and automated distribution of malware. 

N8n’s primary function is to interconnect web applications and services through API-driven logic, which allows companies to orchestrate complex processes across platforms such as Slack, GitHub, and Google Sheets.

The community-licensed edition of the software enables self-hosted deployment, whereas the cloud-based version can extend these capabilities further by integrating AI-driven features that will automatically interact with external data sources and carry out tasks using agent-based models. 

With the platform’s accessibility especially the ability to create developer accounts without any initial investment users have experienced a significant reduction in entry barriers. The platform automatically provisions unique subdomains within its cloud environment for deploying and accessing workflows. 
Although this model is similar to other AI-assisted development ecosystems in terms of convenience, it also introduces an attack surface that threat actors have demonstrated proficiency at exploiting.

In adjacent platforms, adversaries have already developed similar patterns, in which they have utilized legitimate cloud-hosted environments to create phishing infrastructure. 

As part of n8n’s architecture, webhooks are a crucial component, which allow workflows to be dynamically initiated upon receiving external data in a timely manner.

This webhook endpoint is effectively a passive listener that has been assigned unique URLs that enable it to ingest and process inbound requests in real-time. 

Cisco Talos researchers have observed sustained abuse of these publicly accessible endpoints since October 2025, which has drawn scrutiny of this mechanism.

A powerful technique used by attackers to embed malicious logic within otherwise legitimate looking infrastructure is the use of webhook URLs hosted on trusted n8n subdomains. This facilitates phishing campaigns and the distribution of downstream malware. 

As webhooks are essentially reverse APIs where applications can receive and process incoming data including dynamically fetched HTML content these features further compound the risk, because they enable adversaries to exploit automation workflows to execute unauthorized actions under the guise of le

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: