What happened
A new n8n vulnerability (9.9 CVSS) has been disclosed that lets authenticated users execute system commands. The flaw, tracked as CVE-2025-68668, affects workflow automation platform n8n versions 1.0.0 through 1.999.999. An attacker with permission to create or modify workflows can abuse the Python Code Node to bypass sandbox restrictions and execute arbitrary commands on the underlying host. n8n confirmed the issue and released a fix in version 2.0.0, introducing a task runner-based Python execution model to improve isolation. Temporary mitigations include disabling Code Nodes, disabling Python execution, or enabling sandbox execution through environment variables.
Who is affected
Organizations running vulnerable n8n instances where users can create or modify workflows are exposed to remote code execution risks.
Why CISOs should care
Workflow automation platforms often have privileged access to systems and data, making them attractive targets for attackers seeking lateral movement or infrastructure compromise.
3 practical actions
1. Upgrade immediately: Update all n8n deployments to version 2.0.0 to fully remediate the vulnerability.
2. Restrict workflow permissions: Limit who can create or modify workflows to reduce insider and account-takeover risk.
3. Enable execution isolation: Configure the new task runner-based Python sandbox to minimize blast radius from future flaws.
