CVE-2025-68668
Unknown Unknown - Not Provided
Sandbox Bypass in n8n Python Code Node Enables RCE

Publication date: 2025-12-26

Last updated on: 2025-12-26

Assigner: GitHub, Inc.

Description
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-26
Last Modified
2025-12-26
Generated
2026-05-07
AI Q&A
2025-12-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
n8n n8n *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-693 The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a sandbox bypass in the Python Code Node of the n8n workflow automation platform (versions 1.0.0 to before 2.0.0). An authenticated user with permission to create or modify workflows can exploit it to execute arbitrary commands on the host system running n8n, with the same privileges as the n8n process. It arises because the sandbox meant to restrict Python code execution can be bypassed.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an authenticated user to execute arbitrary commands on the host system with the privileges of the n8n process. This can lead to unauthorized access, data compromise, system manipulation, or disruption of services running on the affected host.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade n8n to version 2.0.0 or later where the issue is patched. Alternatively, apply workarounds by disabling the Code Node via the environment variable NODES_EXCLUDE set to '["n8n-nodes-base.code"]', disable Python support in the Code Node by setting N8N_PYTHON_ENABLED=false (available since version 1.104.0), or configure n8n to use the task runner based Python sandbox by setting the environment variables N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER accordingly.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart