GHSA-jjpj-p2wh-qf23

Suggest an improvement
Source
https://github.com/advisories/GHSA-jjpj-p2wh-qf23
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-jjpj-p2wh-qf23/GHSA-jjpj-p2wh-qf23.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jjpj-p2wh-qf23
Aliases
Published
2026-02-25T21:23:15Z
Modified
2026-02-28T05:14:23.927101Z
Severity
  • 9.4 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
n8n has a Sandbox Escape in its JavaScript Task Runner
Details

Impact

An authenticated user with permission to create or modify workflows could exploit a vulnerability in the JavaScript Task Runner sandbox to execute arbitrary code outside the sandbox boundary.

On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task executed on the Task Runner. - Task Runners must be enabled using N8N_RUNNERS_ENABLED=true.

Patches

The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability.

Workarounds

If upgrading is not immediately possible, administrators should consider the following temporary mitigations: - Limit workflow creation and editing permissions to fully trusted users only. - Use external runner mode (N8N_RUNNERS_MODE=external) to limit the blast radius.

These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Resources

Database specific
{
    "nvd_published_at": "2026-02-25T23:16:20Z",
    "github_reviewed_at": "2026-02-25T21:23:15Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "CRITICAL"
}
References

Affected packages

npm / n8n

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.123.22

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-jjpj-p2wh-qf23/GHSA-jjpj-p2wh-qf23.json"

npm / n8n

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.0.0
Fixed
2.9.3

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-jjpj-p2wh-qf23/GHSA-jjpj-p2wh-qf23.json"

npm / n8n

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.10.0
Fixed
2.10.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-jjpj-p2wh-qf23/GHSA-jjpj-p2wh-qf23.json"