New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

A new n8n vulnerability (9.9 CVSS) has been disclosed that lets authenticated users execute system commands. The flaw, tracked as CVE-2025-68668, affects workflow automation platform n8n versions 1.0.0 through 1.999.999. An attacker with permission to create or modify workflows can abuse the Python Code Node to bypass sandbox restrictions and execute arbitrary commands on the underlying host. n8n confirmed the issue and released a fix in version 2.0.0, introducing a task runner-based Python execution model to improve isolation. Temporary mitigations include disabling Code Nodes, disabling Python execution, or enabling sandbox execution through environment variables.

Who is affected

Organizations running vulnerable n8n instances where users can create or modify workflows are exposed to remote code execution risks.

Why CISOs should care

Workflow automation platforms often have privileged access to systems and data, making them attractive targets for attackers seeking lateral movement or infrastructure compromise.

3 practical actions

1. Upgrade immediately: Update all n8n deployments to version 2.0.0 to fully remediate the vulnerability.

2. Restrict workflow permissions: Limit who can create or modify workflows to reduce insider and account-takeover risk.

3. Enable execution isolation: Configure the new task runner-based Python sandbox to minimize blast radius from future flaws.