JustAppSec
Back to news

n8n patches critical expression sandbox escape enabling RCE

1 min readPublished 25 Feb 2026Updated 25 Feb 2026Source: CVE Project (cvelistV5)

TL;DR — A critical sandbox escape in n8n's expression evaluator lets authenticated workflow editors execute arbitrary system commands on the host machine.

What happened

n8n is an open-source workflow automation platform that lets teams connect APIs and build automations, often self-hosted as an alternative to Zapier. A critical vulnerability in n8n allows authenticated users who can create or modify workflows to escape the expression-evaluation sandbox and execute system commands on the host. This is described as additional exploits following a prior sandbox escape (CVE-2025-68613), assigned a CVSS v4.0 base score of 9.4 (Critical).

Sandbox escapes in workflow/automation platforms are a recurring theme — n8n, Prefect, and Budibase have all seen similar issues in the past year, highlighting the difficulty of safely evaluating user-provided expressions.

Who is impacted

  • Self-hosted n8n deployments where users can create or modify workflows.
  • Affected version ranges:
BranchAffectedFixed
1.x< 1.123.221.123.22
2.x stable>= 2.0.0, < 2.9.32.9.3
2.x beta>= 2.10.0, < 2.10.12.10.1

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.
  • If you cannot patch immediately:
    • Limit workflow creation/editing permissions to fully trusted users only.
    • Run n8n in a hardened environment with restricted OS privileges and network access.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.