CVE-2026-25115: n8n has a Python sandbox escape
A vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and execute code outside the intended security boundary.
Only authenticated users are able to execute code through Task Runners.
This issue affected any deployment in which the following conditions were met:
- Task Runners were enabled using
N8N_RUNNERS_ENABLED=true(default: false) - Python was enabled
N8N_PYTHON_ENABLED=true - Code Node was enabled (default: true)
In case the N8N_RUNNERS_MODE is set to external (default: internal) the sandbox escape is limited to the sidecar container with lower risk for lateral movement. In that case a lower high severity is more appropriate.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-25115 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →