PT-2026-3396 · N8N · N8N
Natan Nehorai
·
Published
2026-01-18
·
Updated
2026-01-29
·
CVE-2026-0863
CVSS v3.1
8.5
8.5
High
| Base vector | Vector | AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n versions prior to 1.123.14
n8n versions prior to 2.3.5
n8n versions prior to 2.4.2
Description
An issue exists in n8n’s python-task-executor that allows an attacker to bypass sandbox restrictions. By using string formatting and exception handling, an attacker can execute arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions. If n8n is operating in "Internal" execution mode, a full instance takeover is possible. If operating in "External" execution mode, arbitrary code execution occurs inside a Sidecar container.
Recommendations
Update n8n to version 1.123.14 or later.
Update n8n to version 2.3.5 or later.
Update n8n to version 2.4.2 or later.
Exploit
Fix
RCE
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-0863
Affected Products
N8N
References · 25
- 🔥 https://research.jfrog.com/vulnerabilities/n8n-python-runner-sandbox-escape-jfsa-2026-001651077 · Exploit
- https://github.com/n8n-io/n8n/commit/b73a4283cb14e0f27ce19692326f362c7bf3da02⭐ 169784 🔗 53758 · Patch
- https://osv.dev/vulnerability/CVE-2026-0863 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0863 · Security Note
- https://twitter.com/Zeroverse_ai/status/2013450931380331021 · Twitter Post
- https://twitter.com/autumn_good_35/status/2016562101884768318 · Twitter Post
- https://twitter.com/_cvereports/status/2013409312677208246 · Twitter Post
- https://twitter.com/WpvitessePro/status/2013115476474294704 · Twitter Post
- https://twitter.com/rxerium/status/2016507425986154510 · Twitter Post
- https://twitter.com/cracbot/status/2014292016646279340 · Twitter Post
- https://smartkeyss.com/post/cve-2026-0863-python-sandbox-escape-in-n8n-via-exception-formatting-and-implicit-code-execution · Note
- https://twitter.com/TweetThreatNews/status/2016806074054029633 · Twitter Post
- https://twitter.com/TheHackerWire/status/2012930877186023458 · Twitter Post
- https://twitter.com/threatcluster/status/2016635101136794039 · Twitter Post
- https://twitter.com/probablypwned/status/2016919510142370074 · Twitter Post