Skip to content
CVSS 8.8 · HIGH

CVE-2026-42234

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. This issue only affects instances where the Python Task Runner is enabled. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

View on NVD

Analysis

n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 contain a vulnerability in the Python Code Node that allows for a sandbox escape. Authenticated users with workflow permissions can achieve arbitrary code execution on the task runner container. Users of self-hosted n8n instances with the Python Task Runner enabled should upgrade to the latest patched versions.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-94

EPSS

Probability of exploitation (next 30 days): 0.0007 (0.1%)
Percentile: 21.2%
EPSS: 2026-05-06

Affects

n8n:n8n

Technical description

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. This issue only affects instances where the Python Task Runner is enabled. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Published: 5/4/2026, 7:16:06 PM
Last modified: 5/6/2026, 6:05:52 PM

References

HomeEventsBlogResourcesTeam