CVE-2026-0863

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/01/2026
Last modified:
18/01/2026

Description

Using string formatting and exception handling, an attacker may bypass n8n&amp;#39;s python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system.<br /> <br /> The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode.<br /> <br /> If the instance is operating under the "External" execution mode (ex. n8n&amp;#39;s official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.