Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Home/CyberSecurity News/Critical n8n Vulnerability Lets Attackers Execute Allow Arbitrary
CyberSecurity News

Critical n8n Vulnerability Lets Attackers Execute Allow Arbitrary

A Critical n8n Vulnerability has been identified in n8n, the widely used open-source workflow automation platform. This flaw allows authenticated attackers to Execute Allow Arbitrary commands on host...

Sarah simpson
Sarah simpson
January 6, 2026 2 Min Read
34 0

A Critical n8n Vulnerability has been identified in n8n, the widely used open-source workflow automation platform. This flaw allows authenticated attackers to Execute Allow Arbitrary commands on host systems.

The vulnerability, tracked as CVE-2025-68668, has been assigned a severe CVSS score of 9.9 out of 10, underscoring its high severity.​

The security weakness stems from a sandbox-bypass issue in n8n’s Python Code Node, which uses Pyodide for code execution.

This flaw allows authenticated users with workflow-creation or modification permissions to bypass the intended security sandbox.

Attribute Details
CVE ID CVE-2025-68668
Package n8n (npm)
Severity Critical (9.9/10 CVSS)
Affected Versions ≥ 1.0.0 and < 2.0.0
Vulnerability Type Sandbox Bypass / Protection Mechanism Failure (CWE-693)
Attack Vector Network
Impact Arbitrary command execution on the host system

Execute arbitrary commands directly on the host system running n8n, using the same privileges as the n8n process.​

The vulnerability affects all n8n versions from 1.0.0 through 1.111.0, exposing a wide range of deployments to potential compromise.

The attack is low-complexity and requires no user interaction, requiring only network access and low-level authentication privileges.​

Exploiting CVE-2025-68668 can lead to complete system compromise, as attackers can execute commands with n8n process privileges.

The vulnerability’s “Changed” scope classification indicates that the impact extends beyond the vulnerable component itself and may affect resources outside n8n’s security scope.​

The weakness is categorized as CWE-693 (Protection Mechanism Failure), indicating that n8n’s security controls did not provide adequate defense against directed attacks targeting the Python execution environment.​

n8n has addressed this critical vulnerability in version 2.0.0 by implementing a task-runner-based native Python execution model that provides enhanced isolation.

Organizations running affected versions should immediately upgrade to version 2.0.0 or later.​ According to n8n advisories posted on GitHub, organizations unable to upgrade immediately can mitigate risk by applying temporary workarounds.

Disable the Code Node entirely by setting the NODES_EXCLUDE environment variable to exclude n8n-nodes-base.code. Disable Python support by setting the environment variable N8N_PYTHON_ENABLED=false (available from version 1.104.0).

Use a sandboxed Python execution model by enabling the task runner–based Python sandbox through the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Fake WordPress Renewal Email Steals Admin Credit Card Data

Next Post

macOS TCC Bypass Vulnerability Exposes Sensitive User

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
May 15, 2026
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us