<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Webhook on cybercrime.club</title><link>https://cybercrime.club/tags/webhook/</link><description>Recent content in Webhook on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 04 Apr 2026 14:08:56 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/webhook/index.xml" rel="self" type="application/rss+xml"/><item><title>Ni8mare: CVSS 10.0 Unauthenticated RCE in n8n Workflow Automation (CVE-2026-21858)</title><link>https://cybercrime.club/posts/n8n-cve-2026-21858-ni8mare-unauthenticated-rce/</link><pubDate>Sat, 04 Apr 2026 14:08:56 -0400</pubDate><guid>https://cybercrime.club/posts/n8n-cve-2026-21858-ni8mare-unauthenticated-rce/</guid><description>&lt;p>A maximum-severity (CVSS 10.0) unauthenticated remote code execution vulnerability in n8n — one of the most widely deployed open-source workflow automation platforms — has a public proof-of-concept and is being actively tracked. If you&amp;rsquo;re running an internet-accessible n8n instance, this warrants immediate action.&lt;/p>
&lt;h2 id="what-happened">What Happened&lt;/h2>
&lt;p>Cyera Research Labs discovered and responsibly disclosed &lt;strong>CVE-2026-21858&lt;/strong>, dubbed &amp;ldquo;Ni8mare,&amp;rdquo; a content-type confusion bug in n8n&amp;rsquo;s webhook and file-upload handling logic. The flaw allows a completely unauthenticated attacker to read arbitrary files from the underlying host, steal internal credentials, forge administrator sessions, and ultimately execute arbitrary code on the server.&lt;/p></description></item></channel></rss>