Impact
The vulnerability allows an authenticated user with workflow edit rights to escape the Python task runner sandbox and execute arbitrary code on the container running the task runner. This results in remote code execution within the task runner environment, potentially compromising the host if privileges are high. The weakness is a code injection flaw (CWE‑94).
Affected Systems
The affected product is n8n by n8n‑io. All installations running n8n versions older than 1.123.32, 2.17.4, or 2.18.1 that have the Python Task Runner enabled are susceptible. Only the workflow automation platform itself is impacted; downstream applications may be affected if they interact with the compromised task runner.
Risk and Exploitability
CVSS base score of 7.1 indicates a high severity. EPSS is not available, but the vulnerability is not listed in CISA KEV, suggesting it may not yet be widely exploited. An attacker must be an authenticated user with permission to create or modify workflows, which is a relatively high-privilege condition. If such a user exists, they can trigger the sandbox escape and run malicious code on the task runner container.
OpenCVE Enrichment