CVE-2026-25115
📋 TL;DR
This vulnerability in n8n's Python Code node allows authenticated users to escape the Python sandbox and execute arbitrary code on the underlying system. It affects all n8n instances running versions before 2.4.8 where users have access to the Python Code node functionality.
💻 Affected Systems
- n8n
📦 What is this software?
N8n by N8n
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, access sensitive data, install malware, or pivot to other systems.
Likely Case
Privilege escalation leading to unauthorized access to system resources, data exfiltration, or disruption of automation workflows.
If Mitigated
Limited impact if proper network segmentation, least privilege access, and monitoring are in place to contain potential breaches.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of Python sandbox escape techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.8
Vendor Advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-8398-gmmx-564h
Restart Required: Yes
Instructions:
1. Backup your n8n instance and data. 2. Update n8n to version 2.4.8 or later using your deployment method (Docker, npm, etc.). 3. Restart the n8n service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Disable Python Code Node
allTemporarily disable or restrict access to Python Code nodes until patching is complete.
Configure n8n settings to disable Python execution or restrict user permissions
Network Segmentation
allIsolate n8n instances from sensitive systems and implement strict network controls.
🧯 If You Can't Patch
- Implement strict access controls and audit all users with Python Code node permissions
- Deploy additional monitoring and intrusion detection for suspicious Python execution patterns
🔍 How to Verify
Check if Vulnerable:
Check n8n version via web interface or command line. If version is below 2.4.8, the system is vulnerable.
Check Version:
docker exec n8n n8n --version OR check n8n web interface settings
Verify Fix Applied:
Confirm n8n version is 2.4.8 or higher and test that Python Code node functionality works within expected boundaries.
📡 Detection & Monitoring
Log Indicators:
- Unusual Python module imports
- System command execution from Python nodes
- Failed sandbox escape attempts
Network Indicators:
- Unexpected outbound connections from n8n instance
- Unusual data transfers
SIEM Query:
source="n8n" AND (python_execution OR sandbox_violation)