PT-2025-52530 · N8N · N8N
Fatihhcelik
·
Published
2025-12-19
·
Updated
2025-12-22
·
CVE-2025-68613
CVSS v3.1
9.9
9.9
Critical
| Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
n8n and Affected Versions
n8n versions 0.211.0 through 1.120.4
n8n version 1.121.0
n8n versions prior to 1.120.4, 1.121.1, and 1.122.0
Description
n8n, an open source workflow automation platform, contains a critical Remote Code Execution (RCE) issue in its workflow expression evaluation system. An authenticated attacker can supply malicious expressions during workflow configuration that are evaluated in an insufficiently isolated context, allowing them to execute arbitrary code with the privileges of the n8n process. Successful exploitation could lead to a full system compromise, including unauthorized data access, workflow modification, and system-level operations. Over 900,000 n8n services are reportedly exposed on the internet, many with default configurations. The issue stems from a lack of sufficient control over resources with dynamic management. The vulnerability allows authenticated users with workflow edit permissions to inject expressions that bypass the sandbox and execute code on the server. The
SET node is specifically mentioned as a potential entry point for exploitation.Recommendations
Upgrade to n8n version 1.120.4
Upgrade to n8n version 1.121.1
Upgrade to n8n version 1.122.0
Limit workflow creation and editing permissions to fully trusted users only
Deploy n8n in a hardened environment with restricted operating system privileges and network access
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-16183
CVE-2025-68613
Affected Products
N8N
References · 28
- 🔥 https://github.com/rxerium/CVE-2025-68613⭐ 17 🔗 2 · Exploit
- https://bdu.fstec.ru/vul/2025-16183 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-68613 · Security Note
- https://github.com/n8n-io/n8n/commit/1c933358acef527ff61466e53268b41a04be1000⭐ 163738 🔗 52301 · Note
- https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp⭐ 163738 🔗 52301 · Note
- https://github.com/n8n-io/n8n/commit/39a2d1d60edde89674ca96dcbb3eb076ffff6316⭐ 163738 🔗 52301 · Note
- https://github.com/n8n-io/n8n/commit/08f332015153decdda3c37ad4fcb9f7ba13a7c79⭐ 163738 🔗 52301 · Note
- https://t.me/securixy_kz/1273 · Telegram Post
- https://twitter.com/cyberakanksha/status/2003197471330390350 · Twitter Post
- https://twitter.com/TheHackerWire/status/2002162021790564502 · Twitter Post
- https://twitter.com/iterativeguy/status/2003172667562787059 · Twitter Post
- https://reddit.com/r/ArtificialInteligence/comments/1ptbe4g/seems_like_n8n_definitely_got_coal_in_their · Reddit Post
- https://reddit.com/r/devsecops/comments/1psemp5/anyone_else_able_to_patch_cve202568613_related_to · Reddit Post
- https://twitter.com/zoomeye_team/status/2002996269502042599 · Twitter Post
- https://t.me/CVEtracker/40323 · Telegram Post