Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-68668 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: n8n (v1.0.0 to <2.0.0) suffers from a **Sandbox Escape** in the Python Code Node.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-693** (Protection Mechanism Failure). The Python execution environment lacks robust isolation, allowing code to break out of the intended sandbox boundary. 🧱

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users running **n8n** versions **1.0.0** up to (but not including) **2.0.0**. πŸ“¦ Specifically impacts the **Python Code Node** component.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Impact**: Full **Remote Code Execution (RCE)**. Hackers gain the ability to run any command, potentially leading to total server compromise, data theft, or lateral movement. πŸ•΅οΈβ€β™‚οΈ

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Low**. CVSS indicates **Network** access, **Low** complexity, and **No** user interaction required. ⚠️ However, it requires **Low Privileges** (PR:L) to trigger initially.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“‚ **Exploitation**: **Yes**, PoCs are public.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for n8n instances running Python Code Nodes. Verify version is **< 2.0.0**. Use the provided PoC scripts to test sandbox isolation integrity. πŸ§ͺ

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: Official advisory released via **GitHub Security Advisories** (GHSA-62r4-hw23-cc8v). πŸ› οΈ Upgrade to **n8n v2.0.0 or later** to patch the sandbox escape flaw.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If upgrading isn't immediate, **disable the Python Code Node** entirely. Restrict access to n8n interfaces and monitor logs for suspicious command execution attempts. 🚫

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score implies Critical impact (C:H, I:H). With public PoCs available, immediate patching to v2.0.0+ is strongly recommended. ⏳