Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68668: CWE-693: Protection Mechanism Failure in n8n-io n8n

0
Critical
VulnerabilityCVE-2025-68668cvecve-2025-68668cwe-693
Published: Fri Dec 26 2025 (12/26/2025, 21:49:20 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

CVE-2025-68668 is a critical sandbox bypass vulnerability in the n8n workflow automation platform versions 1. 0. 0 to before 2. 0. 0. It affects the Python Code Node that uses Pyodide, allowing an authenticated user with workflow modification permissions to execute arbitrary commands on the host system with the same privileges as the n8n process. The vulnerability does not require user interaction but does require authentication with specific permissions. It has a CVSS score of 9. 9, reflecting its critical impact on confidentiality, integrity, and availability. The issue is patched in n8n version 2.

AI-Powered Analysis

AILast updated: 12/26/2025, 22:09:31 UTC

Technical Analysis

CVE-2025-68668 is a critical vulnerability identified in the n8n open source workflow automation platform, specifically affecting versions from 1.0.0 up to but not including 2.0.0. The vulnerability arises from a sandbox bypass in the Python Code Node, which leverages Pyodide to execute Python code within workflows. Normally, sandboxing restricts code execution to prevent unauthorized system access; however, due to a protection mechanism failure (CWE-693), an authenticated user with permissions to create or modify workflows can bypass these restrictions. This allows arbitrary command execution on the host operating system with the same privileges as the n8n process, potentially leading to full system compromise depending on the privileges assigned to n8n. The vulnerability does not require user interaction but does require authentication with specific workflow modification rights, making insider threats or compromised accounts particularly dangerous. The vulnerability has been assigned a CVSS v3.1 score of 9.9, indicating critical severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change affecting confidentiality and integrity highly, and availability to a lesser extent. The issue was patched in n8n version 2.0.0. Until patching, mitigations include disabling the Code Node entirely by setting the environment variable NODES_EXCLUDE to exclude "n8n-nodes-base.code", disabling Python support in the Code Node via N8N_PYTHON_ENABLED=false (available since version 1.104.0), or configuring n8n to use the task runner-based Python sandbox through environment variables N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER. These mitigations reduce or eliminate the attack surface by restricting or sandboxing Python code execution more securely. No known exploits are reported in the wild yet, but the critical nature and ease of exploitation make this a high-priority issue for organizations using affected n8n versions.

Potential Impact

For European organizations, the impact of CVE-2025-68668 can be severe. Since n8n is used for automating workflows, including business-critical processes, exploitation could lead to unauthorized command execution on servers hosting n8n, potentially resulting in data breaches, system manipulation, or lateral movement within networks. Confidentiality is at high risk as attackers can access sensitive data processed or stored by n8n workflows. Integrity is compromised because attackers can alter workflows or data outputs, disrupting business operations or injecting malicious actions. Availability impact is moderate but still significant, as attackers could disrupt automation services, causing operational downtime. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on automated workflows are particularly vulnerable. The requirement for authenticated access means that compromised credentials or insider threats could trigger exploitation. Given the critical CVSS score and the ability to execute arbitrary commands, the threat could facilitate ransomware deployment, espionage, or sabotage. European entities using vulnerable n8n versions without mitigations are at high risk of severe operational and reputational damage.

Mitigation Recommendations

European organizations should immediately upgrade n8n installations to version 2.0.0 or later, where the vulnerability is patched. If immediate upgrading is not feasible, implement the following mitigations: 1) Disable the Python Code Node by setting the environment variable NODES_EXCLUDE to exclude "n8n-nodes-base.code" to prevent use of the vulnerable node. 2) Disable Python support in the Code Node by setting N8N_PYTHON_ENABLED=false, available since n8n version 1.104.0, to block Python code execution. 3) Configure n8n to use the task runner-based Python sandbox by enabling N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables, which provide a more secure sandbox environment. 4) Restrict workflow creation and modification permissions to trusted administrators only, minimizing the risk of exploitation by unauthorized users. 5) Monitor logs for suspicious workflow changes or unusual command executions. 6) Employ network segmentation and host-based intrusion detection to detect and prevent lateral movement if exploitation occurs. 7) Enforce strong authentication and credential management to reduce risk of compromised accounts. These targeted mitigations reduce attack surface and exposure until patching is completed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-22T23:37:00.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694f040e33784cecd498bd23

Added to database: 12/26/2025, 9:54:22 PM

Last enriched: 12/26/2025, 10:09:31 PM

Last updated: 12/27/2025, 1:11:28 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats