2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
A serious vulnerability in n8n allows authenticated users to execute arbitrary commands on the host system. This flaw, tracked as CVE-2025-68668, affects versions 1.0.0 to just before 2.0.0 and has been fixed in the latest release. Users are advised to implement specific workarounds until they upgrade.
If you do, here's more
A serious security vulnerability has been found in n8n, an open-source workflow automation platform. Identified as CVE-2025-68668, this flaw carries a CVSS score of 9.9, indicating its severity. It allows an authenticated user who can create or modify workflows to execute arbitrary commands on the host system. The issue arises from a failure in the platform's protection mechanisms and affects versions 1.0.0 through 1.9999. n8n has patched this vulnerability in version 2.0.0.
The vulnerability, dubbed N8scape, is linked to a sandbox bypass in the Python Code Node utilizing Pyodide. While n8n introduced a task runner-based Python implementation for better security in version 1.111.0, users still need to take precautions. n8n recommends disabling the Code Node or Python support and enabling the task runner-based sandbox through specific environment variables.
In a follow-up report, researchers from Cyera elaborated on the vulnerability, explaining that it enables escaping the Pyodide sandbox through the method "_pyodide._base.eval_code()". This flaw collapses the security boundaries, allowing code execution with the same privileges as the n8n process. The researchers highlighted that this issue stems from a structural flaw in the security model, emphasizing that while some risky functions are blocked, the underlying capabilities remain unaddressed.
Questions about this article
No questions yet.