Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical N8n Sandbox Escape Could Lead to Server Compromise

The vulnerability could allow attackers to execute arbitrary commands and steal credentials and other secrets.

AI attack

A critical sandbox escape vulnerability in the n8n AI workflow automation platform could allow attackers to execute arbitrary commands on the server, Pillar Security reports.

Tracked as CVE-2026-25049 (CVSS score of 9.4), the issue impacts the manner in which the n8n sandbox’s sanitization routine evaluates JavaScript expressions.

Pillar discovered that the sandbox’s sanitizer could be bypassed via JavaScript expressions that contained properties with a template literal, and via arrow functions and specific stack frame objects that would return real global objects.

These weaknesses in implementation allowed the security firm to escape the n8n sandbox and achieve command execution on the server.

The attack, Pillar says, led to full server compromise, allowing access to all environment variables, stored credentials, API and cloud keys, OAuth tokens, and configuration files.

Armed with the compromised secrets, an attacker could access connected cloud accounts, hijack AI pipelines and redirect traffic, and access internal services on n8n cloud instances.

Advertisement. Scroll to continue reading.

According to Pillar, a successful attack could be mounted by creating or modifying a workflow with parameters containing crafted expressions.

“The entire attack fits inside what looks like a data transformation. No special permissions required. No admin access – just a user who can edit workflows,” Pillar notes.

The company reported the bug to n8n on December 21 and a fix was rolled out two days later, blocking template literals. The next day, Pillar discovered that the patch could be bypassed using function arguments, which are not sanitized.

“The root cause in both cases: incomplete AST analysis. The sanitizer made assumptions about how JavaScript code would be written, and we found ways to express the same operations differently,” Pillar notes.

Both the initial vulnerability and its bypass were properly addressed in n8n version 2.4.0, Pillar says. Users are advised to update their instances as soon as possible.

Related: N8n Vulnerabilities Could Lead to Remote Code Execution

Related: Cisco, F5 Patch High-Severity Vulnerabilities

Related: Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities

Related: Critical Vulnerability Patched in jsPDF

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.