PT-2025-53605 · Pyodide+1 · Pyodide+1
Berkdedekarginoglu
+1
·
Published
2025-12-24
·
Updated
2026-02-14
·
CVE-2025-68668
CVSS v3.1
9.9
9.9
Critical
| Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n versions 1.0.0 through less than 2.0.0
Description
n8n is an open source workflow automation platform. A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide, affecting versions from 1.0.0 up to, but not including, 2.0.0. An authenticated user with permission to create or modify workflows can exploit this issue to execute arbitrary commands on the host system running n8n, with the same privileges as the n8n process. This vulnerability, tracked as CVE-2025-68668, has a CVSS score of 9.9 (Critical). Workarounds include disabling the Code Node by setting the environment variable
NODES EXCLUDE to "["n8n-nodes-base.code"]", disabling Python support in the Code node by setting the environment variable N8N PYTHON ENABLED to false (available in n8n version 1.104.0), and configuring n8n to use the task runner based Python sandbox via the N8N RUNNERS ENABLED and N8N NATIVE PYTHON RUNNER environment variables. The task runner-based Python implementation became the default starting with n8n version 2.0.0.Recommendations
Upgrade to n8n version 2.0.0 or later.
As a temporary workaround, disable the Code Node by setting the environment variable
NODES EXCLUDE to "["n8n-nodes-base.code"]".
As a temporary workaround, disable Python support in the Code node by setting the environment variable N8N PYTHON ENABLED to false.
As a temporary workaround, configure n8n to use the task runner based Python sandbox via the N8N RUNNERS ENABLED and N8N NATIVE PYTHON RUNNER environment variables.Fix
RCE
Protection Mechanism Failure
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00123
CVE-2025-68668
GHSA-62R4-HW23-CC8V
Affected Products
Pyodide
N8N
References · 82
- https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v⭐ 173180 🔗 54538 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-62r4-hw23-cc8v · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68668 · Security Note
- https://bdu.fstec.ru/vul/2026-00123 · Security Note
- https://github.com/n8n-io/n8n⭐ 172017 🔗 54278 · Note
- https://reddit.com/r/CVEWatch/comments/1q6cj0c/top_10_trending_cves_07012026 · Reddit Post
- https://twitter.com/Guardian360nl/status/2008569274860741091 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1q5aodg/new_n8n_vulnerability_99_cvss_lets_authenticated · Reddit Post
- https://t.me/cyberok_news/173 · Telegram Post
- https://twitter.com/CveFindCom/status/2004683382320468049 · Twitter Post
- https://twitter.com/wvipersg/status/2008456876904644826 · Twitter Post
- https://twitter.com/TheHackersNews/status/2008406609471406589 · Twitter Post
- https://twitter.com/pentest_swissky/status/2011803809190699039 · Twitter Post
- https://twitter.com/The_SatyaDVV/status/2008733363591614815 · Twitter Post
- https://twitter.com/CrowdCyber_Com/status/2008587744390348839 · Twitter Post