PT-2025-53605 · N8N +1 · N8N +1

Berkdedekarginoglu

+1

·

Published

2025-12-24

·

Updated

2026-01-09

·

CVE-2025-68668

CVSS v3.1
9.9
VectorAV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions n8n versions 1.0.0 through less than 2.0.0
Description n8n is an open source workflow automation platform. A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this issue to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This vulnerability is rated as critical with a CVSS score of 9.9. The vulnerability resides in the Pyodide sandbox within the Python Code Node, allowing authenticated users with workflow permissions to execute arbitrary operating system commands on the host. The issue has been patched in version 2.0.0.
Recommendations Upgrade to n8n version 2.0.0 or higher. Disable the Code Node by setting the environment variable
NODES EXCLUDE
to "["n8n-nodes-base.code"]". Disable Python support in the Code node by setting the environment variable
N8N PYTHON ENABLED
to false, which was introduced in n8n version 1.104.0. Configure n8n to use the task runner based Python sandbox via the
N8N RUNNERS ENABLED
and
N8N NATIVE PYTHON RUNNER
environment variables.

Fix

RCE

Protection Mechanism Failure

Weakness Enumeration

Related Identifiers

BDU:2026-00123
CVE-2025-68668

Affected Products

Pyodide
N8N