New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Return Fraud Startup Pinch AI Raises $5M to Help Retailers Protect Margins

What happened Return‑fraud detection startup Pinch AI has secured $5...

Share

What happened

A new n8n vulnerability (9.9 CVSS) has been disclosed that lets authenticated users execute system commands. The flaw, tracked as CVE-2025-68668, affects workflow automation platform n8n versions 1.0.0 through 1.999.999. An attacker with permission to create or modify workflows can abuse the Python Code Node to bypass sandbox restrictions and execute arbitrary commands on the underlying host. n8n confirmed the issue and released a fix in version 2.0.0, introducing a task runner-based Python execution model to improve isolation. Temporary mitigations include disabling Code Nodes, disabling Python execution, or enabling sandbox execution through environment variables.

Who is affected

Organizations running vulnerable n8n instances where users can create or modify workflows are exposed to remote code execution risks.

Why CISOs should care

Workflow automation platforms often have privileged access to systems and data, making them attractive targets for attackers seeking lateral movement or infrastructure compromise.

3 practical actions

1. Upgrade immediately: Update all n8n deployments to version 2.0.0 to fully remediate the vulnerability.

2. Restrict workflow permissions: Limit who can create or modify workflows to reduce insider and account-takeover risk.

3. Enable execution isolation: Configure the new task runner-based Python sandbox to minimize blast radius from future flaws.