Summary
- Added aliases for Platform threat, screenshot, SHA-1 hash, and organization data fields.
- Deployed several enhancements to the ASM web UI.
- One new software fingerprint for Coolify and one new ASM risk fingerprint for n8n services vulnerable to Ni8mare (CVE-2026-21858).
- Two new Rapid Response advisories:
Platform
- Added the following aliases for Platform data fields:
threatsscreenshotssha1org
ASM
-
Several improvements to the ASM web UI were made, including:
- The workspace selection dropdown is now on the right side of the navigation bar.
- Icons have been added to many of the items available in the top navigation dropdowns.
- Scan frequency information is now located at the bottom of the Resources dropdown.
-
Added links to the Integrations dropdown to see all integrations, connected integrations, available integrations, and integrations that need attention.

Rapid Response
The Censys Rapid Response team published information about and queries for the following issues.
- Three Vulnerabilities in Coolify Self-Hosting Platform [CVE-2025-64424, CVE-2025-64420, CVE-2025-64419]
- The following queries can be used to identify exposed Coolify instances.
- n8n Unauthenticated Remote Code Execution (NI8MARE) [CVE-2026-21858]
- The following queries can be used to identify exposed and potentially vulnerable n8n instances.
New fingerprints
Added the following fingerprints.
| Type | Name | Description | Query |
|---|---|---|---|
| software | Coolify | This is Coolify, an open-source self-hosted platform for managing servers, applications, and databases. | Platform query |
| risk | Vulnerable n8n (Ni8mare) [CVE-2026-21858] | This is a service running a version of n8n workflow automation platform that is vulnerable to CVE-2026-21858 (Ni8mare), a critical unauthenticated Remote Code Execution vulnerability caused by a Content-Type confusion flaw in the webhook and file handling mechanism. Attackers can exploit this by sending specially crafted HTTP requests to form-based workflows to read arbitrary files, extract credentials, forge administrator sessions, and execute arbitrary commands.. | ASM risk query: risks.name: `Vulnerable n8n (Ni8mare) [CVE-2026-21858]` |
