Categories: Cyber Security News

n8n Automation Platform Hit by Arbitrary Command Execution Flaw

A critical security vulnerability has been disclosed in n8n, a popular workflow automation platform, that enables authenticated users to execute arbitrary commands on the host system.

The flaw, tracked as GHSA-62r4-hw23-cc8v, affects the Python Code Node component and poses a significant risk to organizations using the platform for business process automation.

Sandbox Bypass Enables System-Level Access

The vulnerability stems from a sandbox bypass weakness in n8n’s Pyodide-based Python Code Node implementation.

Security researcher Cornelius Suermann from n8n published an advisory two weeks ago, warning that authenticated users with workflow-creation or modification privileges can exploit this flaw to breach the intended security boundaries.

Once exploited, attackers can execute arbitrary commands with the same system privileges as the n8n process, potentially compromising the entire server infrastructure.

This type of sandbox escape vulnerability is particularly dangerous in workflow automation platforms where multiple users may have legitimate access to create and modify automation scripts.

The flaw allows malicious insiders or compromised accounts to move beyond the restricted Python execution environment and interact directly with the underlying operating system.

All n8n versions from 1.0.0 up to but not including 2.0.0 are vulnerable to this arbitrary command execution issue. Organizations running these versions should prioritize patching immediately to prevent potential exploitation.

The vulnerability was addressed in n8n version 2.0.0, which introduces a more secure task-runner-based native Python implementation with enhanced isolation capabilities.

The new security model was first introduced as an optional feature in version 1.111.0, allowing early adopters to enable stronger sandboxing through the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.

This implementation became the default security mechanism starting with the 2.0.0 release.

Organizations unable to immediately upgrade to version 2.0.0 have several temporary mitigation options available.

Administrators can altogether disable the vulnerable Code Node by setting the environment variable NODES_EXCLUDE to “[“n8n-nodes-base.code”]” in their configuration files.

Alternatively, they can disable only Python support within the Code Node by configuring N8N_PYTHON_ENABLED=false, a feature introduced in version 1.104.0.

The most secure temporary solution is to manually enable the task-runner-based Python sandbox on vulnerable versions 1.111.0 and later by setting the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.

However, upgrading to version 2.0.0 remains the recommended permanent solution to address this critical security vulnerability fully.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyber Press as a Preferred Source in Google.

The post n8n Automation Platform Hit by Arbitrary Command Execution Flaw appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

A Look Back, May 11

50 Years Ago An early morning trash fire that may have been set by four…

10 minutes ago

Remembering a master storyteller: Tracy Kidder, Pulitzer Prize winner and beloved local author, Part 2

Editor’s note: This is the second of two parts. “In happy moments one realizes that…

10 minutes ago

After April frost, asparagus farmers take stalk of season ahead

An overnight frost on April 20 set asparagus season off to a false start in…

10 minutes ago

Immigrant protection bills headed for House-Senate talks

BOSTON — Amid widespread fear across the country over federal immigration law enforcement activities, legislation…

11 minutes ago

‘We have to be on the streets’: Northampton City Council approves resolution to hold ICE accountable

NORTHAMPTON — City Council at its last meeting voted unanimously to approve a revised resolution…

11 minutes ago

Dua Lipa Sues Samsung For $15M Over Use Of Her Image On TV Boxes

The post Dua Lipa Sues Samsung For $15M Over Use Of Her Image On TV…

1 hour ago

This website uses cookies.