• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

You are here: Home / General Cyber Security News / New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
January 6, 2026

A new critical security vulnerability has been disclosed in n8n, an open-source workflow automation platform, that could enable an authenticated attacker to execute arbitrary system commands on the underlying host.

The vulnerability, tracked as CVE-2025-68668, is rated 9.9 on the CVSS scoring system. It has been described as a case of a protection mechanism failure.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


It affects n8n versions from 1.0.0 up to, but not including, 2.0.0, and allows an authenticated user with permission to create or modify workflows to execute arbitrary operating system commands on the host running n8n. The issue has been addressed in version 2.0.0.

“A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide,” an advisory for the flaw states. “An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process.”

Cybersecurity

N8n said it had introduced task runner-based native Python implementation in version 1.111.0 as an optional feature for improved security isolation. The feature can be enabled by configuring the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables. With the release of version 2.0.0, the implementation has been made the default.

As workarounds, n8n is recommending that users follow the outlined steps below –

  • Disable the Code Node by setting the environment variable NODES_EXCLUDE: “[\”n8n-nodes-base.code\”]”
  • Disable Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false
  • Configure n8n to use the task runner-based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables

The disclosure comes as n8n addressed another critical vulnerability (CVE-2025-68613, CVSS score: 9.9) that could result in arbitrary code execution under certain circumstances.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «russia aligned hackers abuse viber to target ukrainian military and government Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
  • Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
  • Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
  • ⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
  • The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 
  • Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
  • New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
  • Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
  • The ROI Problem in Attack Surface Management
  • Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.