N8n has been found to have a new critical security flaw. An authenticated attacker might be able to run arbitrary system commands on the underlying host. The vulnerability has a CVSS score of 9.9 and is tracked as CVE-2025-68668.
The flaw was found and reported by Vladimir Tokarev and Ofek Itach of Cyera Research Labs. It affects n8N versions 1.0.0 through, but not limited to, 2.0. It permits an authorized user to create or alter workflows in order to execute arbitrary operating system commands. The open-source workflow automation platform's versions 2.1.0 and 2.2.0 have fixed the problem.
The revelation coincides with n 8n fixing another serious flaw that, in some situations, could lead to arbitrary code execution.
In version 1.111.0, N8n claimed to have added a task runner-based native Python implementation as an optional feature for enhanced security isolation.






