Critical n8n Vulnerability (CVE-2026-21858)

Trust Center

Start your security review
View & download sensitive information
ControlK

Trust Center Updates

Critical n8n Vulnerability (CVE-2026-21858)

Copy link
Vulnerabilities

AlphaSense is aware of a maximum-severity security flaw in n8n, a popular workflow automation platform, that allows an unauthenticated remote attacker to gain complete control over susceptible instances.

Based on the information currently available from n8n, we can confirm that AlphaSense does not use this and is not affected by this incident.

We will post updates here as n8n completes their investigation and shares further findings.

Update to Subprocessor List - 122025

Subprocessors

Update (20 December 2025): We have updated our Subprocessor List. Please visit the Legal section below for details.

Update to Subprocessor List - 121725

Subprocessors

Update (17 December 2025): We have updated our Subprocessor List. Please visit the Legal section below for details.

Apache Tika Vulnerability (CVE-2025-66516)

Vulnerabilities

AlphaSense is not impacted by the recently disclosed critical vulnerability in Apache Tika (CVE-2025-66516). Therefore, no mitigation actions are required.

AlphaSense will continue to monitor the situation and will provide further updates as necessary.

reactShell (CVE-2025-55182)

Vulnerabilities

AlphaSense is aware of React2Shell (CVE‑2025‑55182, CVE‑2025‑66478), two critical remote code execution flaws in React and Next.js. This flaw allows unauthenticated remote code execution (RCE) due to insecure deserialization in the default configuration of affected applications.

The AlphaSense Security and Engineering teams reviewed the potential impact on our products and platforms. We have applied the patches and are no longer impacted.

AlphaSense Security and Engineering teams will continue to monitor the situation and will provide further updates as necessary.

Welcome to AlphaSense's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.
Microsoft-company-logoMicrosoft
Goldman Sachs-company-logoGoldman Sachs
JP Morgan Asset Management-company-logoJP Morgan Asset Management
Google-company-logoGoogle

Documents

POLICIESAcceptable Use Policy

Access Control

Access is tightly monitored and controlled at our company. We are happy to provide more details about our access control practices upon request.

Asset Management

We have strict asset management policies in place to ensure that all assets are accounted for and secure.

Change Management

We have a change and configuration management process in place to ensure that changes are properly reviewed and approved.

Data Privacy

Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.

Endpoint Security

We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.

Infrastructure

We take great care to work with best-in-class infrastructure providers that provide secure computing and storage. We are happy to provide more details about our infrastructure upon request.

Network Security

We protect our corporate network against external & internal threats.

Physical & Environment

We have physical and environmental controls in place to ensure that our data centers are secure and reliable.

Risk Management

We have a dedicated team that manages security risks. We are happy to provide more details about our risk management practices upon request.

Subprocessors

Built onSafeBase by Drata Logo