Early Access — Mondoo Vulnerability Intelligence is currently in preview.
A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide.
An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process.
In n8n version 1.111.0, a task-runner-based native Python implementation was introduced as an optional feature, providing a more secure isolation model.
To enable it, you need to configure the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.
This implementation became the default starting with n8n version 2.0.0.
NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]" (Docs)N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0.N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables. (Docs)2.0.0Exploitability
AV:NAC:LPR:LUI:NScope
S:CImpact
C:HI:HA:LCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L