Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1112-nbsn-jygx
Summary
Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system.

The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode.

If the instance is operating under the  "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.
Aliases
0
alias CVE-2026-0863
Fixed_packages
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0863
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09717
published_at 2026-04-13T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09753
published_at 2026-04-09T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09766
published_at 2026-04-11T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09733
published_at 2026-04-12T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09678
published_at 2026-04-02T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09729
published_at 2026-04-04T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09634
published_at 2026-04-07T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09704
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0863
1
reference_url https://github.com/n8n-io/n8n/commit/b73a4283cb14e0f27ce19692326f362c7bf3da02
reference_id b73a4283cb14e0f27ce19692326f362c7bf3da02
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-20T16:42:52Z/
url https://github.com/n8n-io/n8n/commit/b73a4283cb14e0f27ce19692326f362c7bf3da02
2
reference_url https://research.jfrog.com/vulnerabilities/n8n-python-runner-sandbox-escape-jfsa-2026-001651077/
reference_id n8n-python-runner-sandbox-escape-jfsa-2026-001651077
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-20T16:42:52Z/
url https://research.jfrog.com/vulnerabilities/n8n-python-runner-sandbox-escape-jfsa-2026-001651077/
Weaknesses
0
cwe_id 95
name Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
description The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. eval).
Exploits
Severity_range_score8.5 - 8.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1112-nbsn-jygx