CVE-2026-0863
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/01/2026
Last modified:
26/01/2026
Description
Using string formatting and exception handling, an attacker may bypass n8n&#39;s python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system.<br />
<br />
The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode.<br />
<br />
If the instance is operating under the "External" execution mode (ex. n8n&#39;s official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.
Impact
Base Score 3.x
8.50
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/n8n-io/n8n/commit/b73a4283cb14e0f27ce19692326f362c7bf3da02
- https://research.jfrog.com/vulnerabilities/n8n-python-runner-sandbox-escape-jfsa-2026-001651077/
- https://www.smartkeyss.com/post/cve-2026-0863-python-sandbox-escape-in-n8n-via-exception-formatting-and-implicit-code-execution
- https://research.jfrog.com/vulnerabilities/n8n-python-runner-sandbox-escape-jfsa-2026-001651077/



