CVE-2025-68668: CWE-693: Protection Mechanism Failure in n8n-io n8n
CVE-2025-68668 is a critical sandbox bypass vulnerability in the n8n workflow automation platform versions 1. 0. 0 to before 2. 0. 0. It affects the Python Code Node that uses Pyodide, allowing an authenticated user with workflow modification permissions to execute arbitrary commands on the host system with the same privileges as the n8n process. The vulnerability does not require user interaction but does require authentication with specific permissions. It has a CVSS score of 9. 9, reflecting its critical impact on confidentiality, integrity, and availability. The issue is patched in n8n version 2.
AI Analysis
Technical Summary
CVE-2025-68668 is a critical vulnerability identified in the n8n open source workflow automation platform, specifically affecting versions from 1.0.0 up to but not including 2.0.0. The vulnerability arises from a sandbox bypass in the Python Code Node, which leverages Pyodide to execute Python code within workflows. Normally, sandboxing restricts code execution to prevent unauthorized system access; however, due to a protection mechanism failure (CWE-693), an authenticated user with permissions to create or modify workflows can bypass these restrictions. This allows arbitrary command execution on the host operating system with the same privileges as the n8n process, potentially leading to full system compromise depending on the privileges assigned to n8n. The vulnerability does not require user interaction but does require authentication with specific workflow modification rights, making insider threats or compromised accounts particularly dangerous. The vulnerability has been assigned a CVSS v3.1 score of 9.9, indicating critical severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change affecting confidentiality and integrity highly, and availability to a lesser extent. The issue was patched in n8n version 2.0.0. Until patching, mitigations include disabling the Code Node entirely by setting the environment variable NODES_EXCLUDE to exclude "n8n-nodes-base.code", disabling Python support in the Code Node via N8N_PYTHON_ENABLED=false (available since version 1.104.0), or configuring n8n to use the task runner-based Python sandbox through environment variables N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER. These mitigations reduce or eliminate the attack surface by restricting or sandboxing Python code execution more securely. No known exploits are reported in the wild yet, but the critical nature and ease of exploitation make this a high-priority issue for organizations using affected n8n versions.
Potential Impact
For European organizations, the impact of CVE-2025-68668 can be severe. Since n8n is used for automating workflows, including business-critical processes, exploitation could lead to unauthorized command execution on servers hosting n8n, potentially resulting in data breaches, system manipulation, or lateral movement within networks. Confidentiality is at high risk as attackers can access sensitive data processed or stored by n8n workflows. Integrity is compromised because attackers can alter workflows or data outputs, disrupting business operations or injecting malicious actions. Availability impact is moderate but still significant, as attackers could disrupt automation services, causing operational downtime. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on automated workflows are particularly vulnerable. The requirement for authenticated access means that compromised credentials or insider threats could trigger exploitation. Given the critical CVSS score and the ability to execute arbitrary commands, the threat could facilitate ransomware deployment, espionage, or sabotage. European entities using vulnerable n8n versions without mitigations are at high risk of severe operational and reputational damage.
Mitigation Recommendations
European organizations should immediately upgrade n8n installations to version 2.0.0 or later, where the vulnerability is patched. If immediate upgrading is not feasible, implement the following mitigations: 1) Disable the Python Code Node by setting the environment variable NODES_EXCLUDE to exclude "n8n-nodes-base.code" to prevent use of the vulnerable node. 2) Disable Python support in the Code Node by setting N8N_PYTHON_ENABLED=false, available since n8n version 1.104.0, to block Python code execution. 3) Configure n8n to use the task runner-based Python sandbox by enabling N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables, which provide a more secure sandbox environment. 4) Restrict workflow creation and modification permissions to trusted administrators only, minimizing the risk of exploitation by unauthorized users. 5) Monitor logs for suspicious workflow changes or unusual command executions. 6) Employ network segmentation and host-based intrusion detection to detect and prevent lateral movement if exploitation occurs. 7) Enforce strong authentication and credential management to reduce risk of compromised accounts. These targeted mitigations reduce attack surface and exposure until patching is completed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Belgium, Italy
CVE-2025-68668: CWE-693: Protection Mechanism Failure in n8n-io n8n
Description
CVE-2025-68668 is a critical sandbox bypass vulnerability in the n8n workflow automation platform versions 1. 0. 0 to before 2. 0. 0. It affects the Python Code Node that uses Pyodide, allowing an authenticated user with workflow modification permissions to execute arbitrary commands on the host system with the same privileges as the n8n process. The vulnerability does not require user interaction but does require authentication with specific permissions. It has a CVSS score of 9. 9, reflecting its critical impact on confidentiality, integrity, and availability. The issue is patched in n8n version 2.
AI-Powered Analysis
Technical Analysis
CVE-2025-68668 is a critical vulnerability identified in the n8n open source workflow automation platform, specifically affecting versions from 1.0.0 up to but not including 2.0.0. The vulnerability arises from a sandbox bypass in the Python Code Node, which leverages Pyodide to execute Python code within workflows. Normally, sandboxing restricts code execution to prevent unauthorized system access; however, due to a protection mechanism failure (CWE-693), an authenticated user with permissions to create or modify workflows can bypass these restrictions. This allows arbitrary command execution on the host operating system with the same privileges as the n8n process, potentially leading to full system compromise depending on the privileges assigned to n8n. The vulnerability does not require user interaction but does require authentication with specific workflow modification rights, making insider threats or compromised accounts particularly dangerous. The vulnerability has been assigned a CVSS v3.1 score of 9.9, indicating critical severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change affecting confidentiality and integrity highly, and availability to a lesser extent. The issue was patched in n8n version 2.0.0. Until patching, mitigations include disabling the Code Node entirely by setting the environment variable NODES_EXCLUDE to exclude "n8n-nodes-base.code", disabling Python support in the Code Node via N8N_PYTHON_ENABLED=false (available since version 1.104.0), or configuring n8n to use the task runner-based Python sandbox through environment variables N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER. These mitigations reduce or eliminate the attack surface by restricting or sandboxing Python code execution more securely. No known exploits are reported in the wild yet, but the critical nature and ease of exploitation make this a high-priority issue for organizations using affected n8n versions.
Potential Impact
For European organizations, the impact of CVE-2025-68668 can be severe. Since n8n is used for automating workflows, including business-critical processes, exploitation could lead to unauthorized command execution on servers hosting n8n, potentially resulting in data breaches, system manipulation, or lateral movement within networks. Confidentiality is at high risk as attackers can access sensitive data processed or stored by n8n workflows. Integrity is compromised because attackers can alter workflows or data outputs, disrupting business operations or injecting malicious actions. Availability impact is moderate but still significant, as attackers could disrupt automation services, causing operational downtime. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on automated workflows are particularly vulnerable. The requirement for authenticated access means that compromised credentials or insider threats could trigger exploitation. Given the critical CVSS score and the ability to execute arbitrary commands, the threat could facilitate ransomware deployment, espionage, or sabotage. European entities using vulnerable n8n versions without mitigations are at high risk of severe operational and reputational damage.
Mitigation Recommendations
European organizations should immediately upgrade n8n installations to version 2.0.0 or later, where the vulnerability is patched. If immediate upgrading is not feasible, implement the following mitigations: 1) Disable the Python Code Node by setting the environment variable NODES_EXCLUDE to exclude "n8n-nodes-base.code" to prevent use of the vulnerable node. 2) Disable Python support in the Code Node by setting N8N_PYTHON_ENABLED=false, available since n8n version 1.104.0, to block Python code execution. 3) Configure n8n to use the task runner-based Python sandbox by enabling N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables, which provide a more secure sandbox environment. 4) Restrict workflow creation and modification permissions to trusted administrators only, minimizing the risk of exploitation by unauthorized users. 5) Monitor logs for suspicious workflow changes or unusual command executions. 6) Employ network segmentation and host-based intrusion detection to detect and prevent lateral movement if exploitation occurs. 7) Enforce strong authentication and credential management to reduce risk of compromised accounts. These targeted mitigations reduce attack surface and exposure until patching is completed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-22T23:37:00.930Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694f040e33784cecd498bd23
Added to database: 12/26/2025, 9:54:22 PM
Last enriched: 12/26/2025, 10:09:31 PM
Last updated: 12/27/2025, 1:11:28 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68474: CWE-787: Out-of-bounds Write in espressif esp-idf
MediumCVE-2025-66203: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemon8866 StreamVault
CriticalCVE-2025-64481: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in simonw datasette
LowCVE-2025-68697: CWE-269: Improper Privilege Management in n8n-io n8n
HighCVE-2025-67729: CWE-502: Deserialization of Untrusted Data in InternLM lmdeploy
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.