CVE-2026-25115
CRITICALCVE-2026-25115 is a critical (CVSS 9.9) sandbox escape in n8n's Python Code node — any authenticated user can execute arbitrary code on the host OS. If your teams use n8n to orchestrate AI agents or LLM pipelines, patch to v2.4.8 immediately: every API key and secret stored in n8n workflows is exposed. Low complexity + network accessible = active exploitation is a matter of when, not if.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
Do you use n8n? You're affected.
Severity & Risk
Recommended Action
- 1) PATCH: Upgrade to n8n v2.4.8 immediately — the only complete fix. 2) WORKAROUND (pre-patch): Disable Python Code nodes or restrict workflow editor access to trusted admins only via n8n RBAC. 3) ROTATE: After patching, rotate all credentials stored in n8n (LLM API keys, DB connections, SaaS integrations) — assume compromise if any untrusted users had Python node access. 4) DETECT: Monitor n8n worker process logs for unexpected subprocess spawning, outbound connections to unknown hosts, or file system access outside /home/node; alert on process tree anomalies from the n8n container/process. 5) ISOLATE: Run n8n in a hardened container with restricted network egress, read-only file system where possible, and no host-level capabilities. 6) AUDIT: Review workflow editor permissions — this exploit requires only authenticated access, not admin role.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
n8n is an open source workflow automation platform. Prior to version 2.4.8, a vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and execute code outside the intended security boundary. This issue has been patched in version 2.4.8.
Exploitation Scenario
An attacker with a low-privilege n8n account (contractor, trial user on a shared instance, compromised employee) creates a workflow containing a Python Code node. They craft Python that exploits the sandbox escape to execute OS commands — reading /proc/self/environ, n8n's encrypted credential store, or mounted secret volumes to extract LLM API keys and database credentials. With OpenAI/Anthropic keys, they run unauthorized AI workloads at the victim's expense. With vector DB credentials, they exfiltrate the full RAG corpus. With workflow edit access, they inject persistent malicious logic into existing agent pipelines — silently poisoning AI outputs for every downstream user. Entire exploit chain: under 60 seconds from authenticated login, no admin rights required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H