Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. n8n
  4. ›
  5. CVE-2026-25115

CVE-2026-25115: n8n has a Python sandbox escape

February 4, 2026

A vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and execute code outside the intended security boundary.

Only authenticated users are able to execute code through Task Runners.

This issue affected any deployment in which the following conditions were met:

  • Task Runners were enabled using N8N_RUNNERS_ENABLED=true (default: false)
  • Python was enabled N8N_PYTHON_ENABLED=true
  • Code Node was enabled (default: true)

In case the N8N_RUNNERS_MODE is set to external (default: internal) the sandbox escape is limited to the sidecar container with lower risk for lateral movement. In that case a lower high severity is more appropriate.

References

  • github.com/advisories/GHSA-8398-gmmx-564h
  • github.com/n8n-io/n8n
  • github.com/n8n-io/n8n/commit/5c69970acc7d37049deae67da861f92d2aaa9b03
  • github.com/n8n-io/n8n/security/advisories/GHSA-8398-gmmx-564h
  • nvd.nist.gov/vuln/detail/CVE-2026-25115

Code Behaviors & Features

Detect and mitigate CVE-2026-25115 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.4.8

Fixed versions

  • 2.4.8

Solution

Upgrade to version 2.4.8 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-693: Protection Mechanism Failure

Source file

npm/n8n/CVE-2026-25115.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 00:17:31 +0000.