Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026011501012222 | Publication Time | 2026/01/15 13:44 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】Four Critical Security Vulnerabilities Have Been Identified in n8n (CVE-2025-68613) (CVE-2025-68668) (CVE-2026-21877) (CVE-2026-21858) |
|||
|
[Content] 【CVE-2025-68668, CVSS: 9.9】Due to a sandbox escape vulnerability in the Python code node using Pyodide in n8n, authenticated attackers with permissions to create or modify workflows can execute arbitrary commands on the n8n server with the same privileges as the n8n process. 【CVE-2026-21877, CVSS: 10.0】This vulnerability allows authenticated attackers to execute malicious code through the n8n service, potentially resulting in complete system compromise. 【CVE-2026-21858, CVSS: 10.0】This vulnerability allows unauthenticated attackers to access files on the underlying server by executing certain form-based workflows, leading to the leakage of sensitive data stored in the system. |
|||
|
[Affected Platform] n8n version 1.121.0 n8n versions 1.0.0 through earlier than 2.0.0 (exclusive) n8n versions up to and including 0.121.2 n8n versions 1.65.0 through earlier than 1.121.0 (exclusive) |
|||
|
[Recommended Actions] 【CVE-2025-68668】Please update to the following version: n8n version 2.0.0 【CVE-2026-21877】Please update to the following version: n8n version 1.121.3 【CVE-2026-21858】Please update to the following version: n8n version 1.121.0 |
|||
| [Reference] https://www.twcert.org.tw/tw/cp-169-10636-1fa36-1.html |
|||