Think of a REST API like a waiter in a restaurant. You (an app) tell the waiter what you want (your request), and the waiter goes to the kitchen (the server) to get it for you. REST is just a set of ...
A critical n8n flaw could allow attackers to use crafted expressions in workflows to execute arbitrary commands on the host.