The flaw allows authenticated n8n users with workflow-creation or modification permissions to bypass the intended security sandbox.