CVE-2025-68668

Published Dec 26, 2025

Last updated 2 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-68668 is a vulnerability that affects n8n, an open-source workflow automation platform. Specifically, it is a sandbox bypass vulnerability found in the Python Code Node that utilizes Pyodide. This vulnerability exists in n8n versions from 1.0.0 to before 2.0.0. An authenticated user with the permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n. The attacker can execute commands with the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds include disabling the Code Node or Python support, or configuring n8n to use the task runner-based Python sandbox.

Description
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.
Source
security-advisories@github.com
NVD status
Modified
Products
n8n

Risk scores

CVSS 3.1

Type
Primary
Base score
9.9
Impact score
6
Exploitability score
3.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-693

Social media

Hype score
Not currently trending
  1. #VulnerabilityReport #CVE202568668 n8n Sandbox Escape: How CVE-2025-68668 Turns Workflows into Weapons https://t.co/cKs1SUXTaO

    @Komodosec

    8 Feb 2026

    154 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  2. オープンソースのワークフロー自動化ツールn8nに、環境を抜け出してホストサーバーを完全に制御できてしまう、複数の重大な脆弱性が公開されました。 その一つは、n8nのPython Code Nodeに存在するサンドボッ

    @omomuki_tech

    4 Feb 2026

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. IMPORTANT: Upgrade your self hosted n8n! All supported versions prior to 2.0.0 are affected. CVE-2025-68613 https://t.co/v5KUleCXlR CVE-2025-68668 https://t.co/PW7rPZkWK6 CVE-2026-21858 https://t.co/GK2twlNwnR CVE-2026-21877 https://t.co/DLDO9vYlfa

    @igz4rd

    28 Jan 2026

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. CVE-2025-68668 : Breaking Out of the Python Sandbox in n8n : https://t.co/iGNwjLGw5Y https://t.co/oDyKxFxtyk

    @binitamshah

    16 Jan 2026

    2526 Impressions

    6 Retweets

    26 Likes

    8 Bookmarks

    1 Reply

    0 Quotes

  5. CVE-2025-68668: Breaking Out of the Python Sandbox in n8n https://t.co/riaLBg4vnv

    @pentest_swissky

    15 Jan 2026

    3377 Impressions

    13 Retweets

    31 Likes

    20 Bookmarks

    1 Reply

    0 Quotes

  6. La vulnerabilidad, identificada como CVE-2025-68668, ha recibido una calificación de severidad de 9.9 en la escala CVSS (Common Vulnerability Scoring System). Una puntuación tan cercana al máximo de 10.0 es una señal de alarma inequívoca: indica que la falla es extremadament

    @laprovittera

    12 Jan 2026

    44118 Impressions

    89 Retweets

    447 Likes

    198 Bookmarks

    2 Replies

    1 Quote

  7. 🚨 N8scape [Critical] Jan 12, 2026 A critical security vulnerability, named N8scape, has been discovered in n8n, an open-source workflow automation platform. This vulnerability, tracked as CVE-2025-68668 with a CVSS score of 9.9, allows an authenticated attacker to execute... h

    @transilienceai

    12 Jan 2026

    75 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. Sicherheitsdesaster bei Automatisierungsplattform n8n (CVE-2026-21877, CVE-2025-68668, CVE‑2026‑21858) | Borns IT- und Windows-BlogBorns IT- und Windows-Blog https://t.co/JDnfmW6STY

    @ItE2u

    10 Jan 2026

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. A critical vulnerability has been discovered in n8n, an open-source workflow automation tool. Tracked as CVE-2025-68668. Users are advised to upgrade to n8n version 2.0.0 to mitigate the risk. #VulnerabilityAlert #CVE #ThreatProtection https://t.co/u31cfLDL6r

    @QualysNews

    9 Jan 2026

    51 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Falha crítica no n8n (CVE-2025-68668) permite execução arbitrária de código no servidor. Atualize, isole instâncias e revise workflows. Vale a pena discutir? Comente e acesse. #n8n #CVE #segurança https://t.co/Qmvxrt8HCC

    @renda_Geek

    9 Jan 2026

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. The CVE-2025-68668 vulnerability in n8n's Python Code Node allows attackers to execute arbitrary system commands, potentially leading to malware, data theft, and system compromise. Users should update to n8n v1.111.0 or v2.0.0 for enhanced security. #n8n #security #vulnerability

    @ProgresiveRobot

    9 Jan 2026

    68 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. A critical vulnerability in n8n could allow authenticated attackers to execute arbitrary commands on affected systems. CVE-2025-68668 impacts versions prior to 2.0.0. Users should upgrade immediately. Learn more https://t.co/DpMw4EbZaz #VulnerabilityAlert #CVE #ThreatProtection

    @qualys

    7 Jan 2026

    289 Impressions

    2 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 Upozorňujeme na kritickou zranitelnost v n8n, CVE-2025-68668. Tato zranitelnost umožňuje autentizovanému útočníkovi s oprávněním vytvářet nebo upravovat workflow obejít sandbox omezení v Python Code Node (využívající Pyodide) a spustit libovolné systémov

    @GOVCERT_CZ

    7 Jan 2026

    264 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🚨Alert🚨:CVE-2025-68668 (CVSS 9.9) : New n8n Vulnerability Lets Authenticated Users Execute System Commands. 🧐Deep Dive :https://t.co/tJASkiYDgA 📊933.9K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/4egX4O40LN 👇Query HUNTER :

    @HunterMapping

    7 Jan 2026

    3121 Impressions

    18 Retweets

    66 Likes

    22 Bookmarks

    0 Replies

    1 Quote

  15. 🚨n8n vulnerability Priority Alert for DevOps & Automation teams: A 9.9/10 Critical vulnerability (CVE-2025-68668) has just hit n8n. If you’re self-hosting, patch NOW. Full technical breakdown here: https://t.co/z5S3K5yFdi https://t.co/gcMuddOGoD

    @cvedatabase

    6 Jan 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Vulnerabilidade crítica no n8n permite execução de comandos: Falha grave no n8n (CVE-2025-68668) permite que usuários autenticados executem comandos arbitrários no sistema, afetando versões até 2.0.0; atualização para 2.0.0 corrige o problema. https://t.co/PQbhov27FC

    @caveiratech

    6 Jan 2026

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. یک آسیب‌پذیری امنیتی بحرانی در پلتفرم اتوماسیون گردش کار متن‌باز n8n کشف شده که به مهاجمان احراز هویت شده اجازه می‌دهد دستورات دلخواه سیستمی را بر روی سر

    @Teeegra

    6 Jan 2026

    2203 Impressions

    1 Retweet

    20 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  18. A critical flaw (CVE-2025-68668) in n8n versions before 2.0.0 allows authenticated users to bypass the Python Code Node sandbox and execute arbitrary system commands. Fixed in v2.0.0. #n8nSecurity #CodeExecution #CVE2025 https://t.co/nC4eymAs7j

    @TweetThreatNews

    6 Jan 2026

    47 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  19. 📢 𝐇𝐨𝐭 𝐨𝐟𝐟 𝐭𝐡𝐞 𝐩𝐫𝐞𝐬𝐬: 𝐂𝐕𝐄 𝐢𝐧𝐬𝐢𝐠𝐡𝐭𝐬! Inside CVE-2025-68668: Learn how this critical n8n automation flaw lets attackers bypass sandbox defenses to gain OS-level access. 🌐 Explore the write-up → https

    @PurpleOps_io

    6 Jan 2026

    58 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. n8n workflow automation platformunda CVE-2025-68668 kodlu kritik zafiyet (CVSS 9.9) açıklandı. Yetkili kullanıcılar sistemde arbitrary command execution yapabilir. Sorun protection mechanism failure kaynaklıdır. https://t.co/leR1BdZE7c

    @err_cod

    6 Jan 2026

    105 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Critical n8n vulnerability (CVE-2025-68668) rated CVSS 9.9 allows authenticated users to run arbitrary system commands on the host. Patch released. Update immediately or disable vulnerable nodes. Link in pinned comment. What’s your take on automation platform security? https:

    @TechNadu

    6 Jan 2026

    72 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  22. A critical flaw in n8n workflow automation (CVE-2025-68668) allows authenticated users to execute arbitrary system commands. Update to version 2.0.0 immediately. https://t.co/ndG1ogczw7 #CyberSecurity #n8nSecurity #RCE #PythonExploit #VulnerabilityAlert #Infosec #Pyodide https

    @redsecuretech

    6 Jan 2026

    46 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  23. n8n'de kritik bir sandbox-bypass açığı (CVE-2025-68668, CVSS: 9.9) keşfedildi. Kimliği doğrulanmış saldırganlar, sunucuda rastgele komut çalıştırabilir. Tüm n8n kullanıcıları derhal güncelleme yapmalı. #SiberGuvenlik #CVE #Exploit https://t.co/6h19uuzftl

    @osmanmuratgul

    6 Jan 2026

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. New n8n critical vulnerability CVE-2025-68668 https://t.co/re21Kvytst #infosec

    @allaboutclait

    6 Jan 2026

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 🚨 Critical security vulnerability in n8n! Authenticated users can execute system commands 🔒 CVE-2025-68668 scored 9.9 CVSS. Protection mechanism failed! Update now! #n8n #SecurityVulnerability #CVSS9.9 🛡️ Read more: https://t.co/bbNreIVb7w

    @HackingRabbitS

    6 Jan 2026

    213 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  26. 🚨 Critical Alert: A new n8n vulnerability (CVE-2025-68668, CVSS 9.9) allows authenticated users to execute system commands via a sandbox bypass. If you run n8n < 2.0.0, patch NOW. 👉 Full breakdown & mitigations below. https://t.co/gT2GzyFo0B #CyberSecurity #DevOps

    @FindSecCyber

    6 Jan 2026

    71 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨 N8n users, buckle up! CVE-2025-68668 is a wild ride. Authenticated users can system command via workflows? That's like giving your keys to a valet and they go joyriding on your server! 🚗💨 Patch immediately if you're 1.x! https://t.co/jehHXRQMVx #N8n #CVE #InfoSec

    @zench4n

    6 Jan 2026

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. CVE-2025-68668 dropped! 😮 Looks like some software thought it was a good idea to accept ANY old input. It's like leaving your digital front door unlocked with a "come on in!" sign. Patch up, folks! 🔒 Read more: https://t.co/jehHXRQMVx #CyberSecurity #CVE #Vulnerability

    @zench4n

    6 Jan 2026

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. Une faille critique (CVE-2025-68668, CVSS 9.9) dans n8n permet l'exécution de commandes système. Mise à jour urgente requise. #Cybersecurity #Vulnerability https://t.co/1QtkEonpM4 @TheHackersNews

    @cyberwatcher_

    6 Jan 2026

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 🚨 A critical sandbox vulnerability (CVE-2025-68668; CVSS 9.9) in n8n's python code node allows authenticated users to execute arbitrary commands on the target system. I've created a vulnerability script here: https://t.co/Urp4ucjPFX In n8n version 1.111.0, a task-runner-base

    @rxerium

    6 Jan 2026

    14653 Impressions

    53 Retweets

    260 Likes

    106 Bookmarks

    3 Replies

    0 Quotes

  31. N8n patched a critical flaw (CVE-2025-68668) in its workflow automation platform that let authenticated users run system commands on the host via a Python sandbox bypass. The bug affects versions 1.0.0–<2.0.0 and is fixed in 2.0.0. 💖38 9 https://t.co/SHUCVdII7f

    @MillyWinbu51816

    6 Jan 2026

    18 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    9 Replies

    0 Quotes

  32. 📌 تم الكشف عن ثغرة أمنية خطيرة في منصة n8n للأتمتة، تتيح للمهاجمين المعتمدين تنفيذ أوامر نظام عشوائية. تم تصنيف الثغرة برمز CVE-2025-68668 وحصلت على تقييم 9.9 في ن

    @Cybercachear

    6 Jan 2026

    78 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨 Popular workflow automation platform n8n disclosed a critical flaw that lets authenticated users with workflow edit rights execute OS commands on the host. Tracked as CVE-2025-68668, the issue carries a CVSS score of 9.9. 🔗 Details here → https://t.co/M4YcSAP9Ip

    @TheHackersNews

    6 Jan 2026

    12410 Impressions

    46 Retweets

    93 Likes

    23 Bookmarks

    4 Replies

    1 Quote

  34. CVE-2025-68668 poses a serious threat to n8n users! This vulnerability allows for sandbox bypass, risking your workflows. Know your risks and read our insights here: https://t.co/HwhmOeI5gR #n8n #Cybersecurity #Vulnerability

    @Smart_NFT2

    2 Jan 2026

    33 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 🚨 n8n [—] Jan 01, 2026 Comprehensive security advisory on critical vulnerabilities, including CVE-2025-68613 and CVE-2025-68668, impacting the n8n workflow automation platform. Aimed at informing enterprise operators, administrators, and integrators about risks, impacts, and

    @transilienceai

    1 Jan 2026

    110 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. n8n-io/n8n is vulnerable to arbitrary command execution (CVE-2025-68668) via its Pyodide-based Python Code Node. #n8n #RCE #infosec https://t.co/XTpRkcb4ey

    @pulsepatchio

    27 Dec 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. CVE-2025-68668 n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodid… https://t.co/Re51s5LsNQ

    @CVEnew

    27 Dec 2025

    97 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. 🚨 CRITICAL: n8n-io n8n (v1.0.0–<2.0.0) has a sandbox bypass bug—CVE-2025-68668. Auth'd users with workflow perms can run arbitrary commands! Patch to v2.0.0 ASAP. Details: https://t.co/Kz1LQRlSl3 #OffSeq #n8n ... https://t.co/wU5plmEUtF

    @offseq

    27 Dec 2025

    67 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  39. [CVE-2025-68668: CRITICAL] Critical security update for n8n workflow automation platform! A vulnerability allows execution of arbitrary commands pre-2.0.0. Update to version 2.0.0 to stay secure.#cve,CVE-2025-68668,#cybersecurity https://t.co/oPKtUt0lOt https://t.co/CpQeSKgE8e

    @CveFindCom

    26 Dec 2025

    72 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. CVE-2025-68668 Authenticated Sandbox Bypass in n8n Python Code Node Leading to Remote Code Execution https://t.co/N4JBZNafLE

    @VulmonFeeds

    26 Dec 2025

    82 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 🔴 CVE-2025-68668 - Critical n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated u... https://t.co/0msUnUAK7V https://t.co/nRsOJg4IJY

    @TheHackerWire

    26 Dec 2025

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations