
[CIVN-2025-0390] Remote Code Execution vulnerability in n8n (npm)
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution vulnerability in n8n (npm)
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
n8n Workflow Automation Platform (npm) versions prior to 2.0.0
Overview
A critical vulnerability has been reported in n8n Workflow Automation Platform (npm), which could be exploited by an authenticated attacker to execute arbitrary code, perform a sandbox escape, and gain unauthorized access on the targeted system.
Target Audience:
System administrators, DevOps teams and organizations deploying or managing n8n Workflow Automation Platform.
Risk Assessment:
High risk of arbitrary code execution, sandbox escape, and unauthorized access.
Impact Assessment:
Potential for full system compromise, sensitive data exposure, workflow manipulation, service disruption, and unauthorized lateral movement.
Description
n8n is an open-source workflow automation platform used to design, execute and manage automated workflows that integrate applications, services and APIs.
A critical vulnerability exists in the n8n Python Code Node due to sandbox bypass flaw. This vulnerability could be exploited by an authenticated user with permission to create or modify workflows.
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands, perform a sandbox escape, and gain unauthorized access on the target system running n8n.
Workaround
Disable Code Node: Set the value for environment variable NODES_EXCLUDE to ‘[‘n8n-nodes-base.code’]’
Disable python support in Code Node: Set environment variable N8N_PYTHON_ENABLED as false.
Use environment variables N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER to use task runner based python sandbox.
Solution
Apply appropriate updates as mentioned by the vendor:
https://n8n.io/legal/security/
Vendor Information
n8n Workflow Automation Platform
https://n8n.io/
References
https://n8n.io/legal/security/
https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v
CVE Name
CVE-2025-68668
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=fhxo
—–END PGP SIGNATURE—–


