Article Details

Scrape Timestamp (UTC): 2026-01-06 05:10:54.564

Source: https://thehackernews.com/2026/01/new-n8n-vulnerability-99-cvss-lets.html

Original Article Text

Click to Toggle View

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands. A new critical security vulnerability has been disclosed in n8n, an open-source workflow automation platform, that could enable an authenticated attacker to execute arbitrary system commands on the underlying host. The vulnerability, tracked as CVE-2025-68668, is rated 9.9 on the CVSS scoring system. It has been described as a case of a protection mechanism failure. It affects n8n versions from 1.0.0 up to, but not including, 2.0.0, and allows an authenticated user with permission to create or modify workflows to execute arbitrary operating system commands on the host running n8n. The issue has been addressed in version 2.0.0. "A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide," an advisory for the flaw states. "An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process." N8n said it had introduced task runner-based native Python implementation in version 1.111.0 as an optional feature for improved security isolation. The feature can be enabled by configuring the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables. With the release of version 2.0.0, the implementation has been made the default. As workarounds, n8n is recommending that users follow the outlined steps below - The disclosure comes as n8n addressed another critical vulnerability (CVE-2025-68613, CVSS score: 9.9) that could result in arbitrary code execution under certain circumstances.

Daily Brief Summary

VULNERABILITIES // Critical n8n Vulnerability Allows Command Execution on Host Systems

A critical vulnerability in n8n, tracked as CVE-2025-68668, allows authenticated users to execute arbitrary system commands on the host, rated 9.9 on the CVSS scale.

The flaw affects n8n versions from 1.0.0 to just before 2.0.0, posing significant security risks for organizations using these versions.

The vulnerability arises from a sandbox bypass in the Python Code Node, allowing command execution with the same privileges as the n8n process.

Version 2.0.0 of n8n addresses the issue by implementing a task runner-based native Python feature as the default for enhanced security.

Users are advised to upgrade to version 2.0.0 or configure environment variables to enable the task runner feature as a workaround.

This disclosure follows another critical vulnerability in n8n, CVE-2025-68613, also rated 9.9, emphasizing the need for prompt security updates.

Organizations using n8n should review their security protocols and ensure systems are updated to mitigate potential exploitation risks.