PT-2025-53605 · N8N +1 · N8N +1
Berkdedekarginoglu
+1
·
Published
2025-12-24
·
Updated
2026-01-09
·
CVE-2025-68668
CVSS v3.1
9.9
9.9
Critical
| Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n versions 1.0.0 through less than 2.0.0
Description
n8n is an open source workflow automation platform. A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this issue to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This vulnerability is rated as critical with a CVSS score of 9.9. The vulnerability resides in the Pyodide sandbox within the Python Code Node, allowing authenticated users with workflow permissions to execute arbitrary operating system commands on the host. The issue has been patched in version 2.0.0.
Recommendations
Upgrade to n8n version 2.0.0 or higher.
Disable the Code Node by setting the environment variable
NODES EXCLUDE to "["n8n-nodes-base.code"]".
Disable Python support in the Code node by setting the environment variable N8N PYTHON ENABLED to false, which was introduced in n8n version 1.104.0.
Configure n8n to use the task runner based Python sandbox via the N8N RUNNERS ENABLED and N8N NATIVE PYTHON RUNNER environment variables.Fix
RCE
Protection Mechanism Failure
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2026-00123
CVE-2025-68668
Affected Products
Pyodide
N8N
References · 63
- https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v⭐ 164890 🔗 52649 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68668 · Security Note
- https://bdu.fstec.ru/vul/2026-00123 · Security Note
- https://github.com/n8n-io/n8n⭐ 167081 🔗 53196 · Note
- https://twitter.com/CVEnew/status/2004868114484511012 · Twitter Post
- https://twitter.com/ThreatSynop/status/2008552956367450264 · Twitter Post
- https://twitter.com/allaboutclait/status/2008467720329982081 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1q5aodg/new_n8n_vulnerability_99_cvss_lets_authenticated · Reddit Post
- https://twitter.com/ProgresiveRobot/status/2009430174433952154 · Twitter Post
- https://twitter.com/snap_sec/status/2009157228931231805 · Twitter Post
- https://twitter.com/socradar/status/2008548572200137113 · Twitter Post
- https://twitter.com/CrowdCyber_Com/status/2008587744390348839 · Twitter Post
- https://t.me/thehackernews/8150 · Telegram Post
- https://twitter.com/EddieWhoWrites/status/2008523583006667070 · Twitter Post
- https://twitter.com/PurpleOps_io/status/2008569706798559380 · Twitter Post