Critical n8n Vulnerability (CVE-2026-21858)
AlphaSense is aware of a maximum-severity security flaw in n8n, a popular workflow automation platform, that allows an unauthenticated remote attacker to gain complete control over susceptible instances.
Based on the information currently available from n8n, we can confirm that AlphaSense does not use this and is not affected by this incident.
We will post updates here as n8n completes their investigation and shares further findings.
Update to Subprocessor List - 122025
Update (20 December 2025): We have updated our Subprocessor List. Please visit the Legal section below for details.
Update to Subprocessor List - 121725
Update (17 December 2025): We have updated our Subprocessor List. Please visit the Legal section below for details.
Apache Tika Vulnerability (CVE-2025-66516)
AlphaSense is not impacted by the recently disclosed critical vulnerability in Apache Tika (CVE-2025-66516). Therefore, no mitigation actions are required.
AlphaSense will continue to monitor the situation and will provide further updates as necessary.
reactShell (CVE-2025-55182)
AlphaSense is aware of React2Shell (CVE‑2025‑55182, CVE‑2025‑66478), two critical remote code execution flaws in React and Next.js. This flaw allows unauthenticated remote code execution (RCE) due to insecure deserialization in the default configuration of affected applications.
The AlphaSense Security and Engineering teams reviewed the potential impact on our products and platforms. We have applied the patches and are no longer impacted.
AlphaSense Security and Engineering teams will continue to monitor the situation and will provide further updates as necessary.
Documents
Access Control
Access Control
Access is tightly monitored and controlled at our company. We are happy to provide more details about our access control practices upon request.
Asset Management
Asset Management
We have strict asset management policies in place to ensure that all assets are accounted for and secure.
Change Management
Change Management
We have a change and configuration management process in place to ensure that changes are properly reviewed and approved.
Data Privacy
Data Privacy
Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.
Endpoint Security
Endpoint Security
We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.
Infrastructure
Infrastructure
We take great care to work with best-in-class infrastructure providers that provide secure computing and storage. We are happy to provide more details about our infrastructure upon request.
Network Security
Network Security
We protect our corporate network against external & internal threats.
Physical & Environment
Physical & Environment
We have physical and environmental controls in place to ensure that our data centers are secure and reliable.
Risk Management
Risk Management
We have a dedicated team that manages security risks. We are happy to provide more details about our risk management practices upon request.


