PT-2026-3396 · N8N · N8N
Natan Nehorai
·
Published
2026-01-18
·
Updated
2026-01-30
·
CVE-2026-0863
CVSS v3.1
8.5
8.5
High
| Base vector | Vector | AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n versions prior to 1.123.14
n8n versions prior to 2.3.5
n8n versions prior to 2.4.2
Description
An issue exists in n8n that allows an attacker to bypass the python-task-executor sandbox restrictions. This bypass is achieved through the use of string formatting and exception handling, enabling the execution of arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited by an authenticated user with basic permissions via the Code block. In instances operating under "Internal" execution mode, a full n8n instance takeover is possible. If the instance operates under "External" execution mode, arbitrary code execution occurs within a Sidecar container, reducing the impact. The vulnerability is related to a Python 3.10 error-handling feature that bypasses static analysis. The vulnerability is exploitable through the use of f-strings and the
traceback object.Recommendations
Update n8n to version 1.123.14 or later.
Update n8n to version 2.3.5 or later.
Update n8n to version 2.4.2 or later.
Exploit
Fix
RCE
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-0863
Affected Products
N8N
References · 31
- 🔥 https://research.jfrog.com/vulnerabilities/n8n-python-runner-sandbox-escape-jfsa-2026-001651077 · Exploit
- https://github.com/n8n-io/n8n/commit/b73a4283cb14e0f27ce19692326f362c7bf3da02⭐ 169784 🔗 53758 · Patch
- https://osv.dev/vulnerability/CVE-2026-0863 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0863 · Security Note
- https://twitter.com/TheHackerWire/status/2012930877186023458 · Twitter Post
- https://twitter.com/autumn_good_35/status/2016562101884768318 · Twitter Post
- https://twitter.com/GoPlusSecurity/status/2016814674445255032 · Twitter Post
- https://twitter.com/socradar/status/2016843768935415935 · Twitter Post
- https://twitter.com/cracbot/status/2014292016646279340 · Twitter Post
- https://smartkeyss.com/post/cve-2026-0863-python-sandbox-escape-in-n8n-via-exception-formatting-and-implicit-code-execution · Note
- https://t.me/tomhunter/3178 · Telegram Post
- https://twitter.com/TweetThreatNews/status/2017259060626596110 · Twitter Post
- https://twitter.com/CveFindCom/status/2012927757924106330 · Twitter Post
- https://twitter.com/Zeroverse_ai/status/2013450931380331021 · Twitter Post
- https://twitter.com/threatcluster/status/2016635101136794039 · Twitter Post