CVE-2026-42234
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. This issue only affects instances where the Python Task Runner is enabled. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
View on NVDAnalysis
n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 contain a vulnerability in the Python Code Node that allows for a sandbox escape. Authenticated users with workflow permissions can achieve arbitrary code execution on the task runner container. Users of self-hosted n8n instances with the Python Task Runner enabled should upgrade to the latest patched versions.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCWE-94EPSS
Affects
n8n:n8nTechnical description
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. This issue only affects instances where the Python Task Runner is enabled. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.