PT-2025-52530 · N8N · N8N
Fatihhcelik
·
Published
2025-12-19
·
Updated
2026-01-13
·
CVE-2025-68613
CVSS v3.1
9.9
9.9
Critical
| Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n versions 0.211.0 through 1.120.3
n8n versions prior to 1.120.4
n8n versions prior to 1.121.1
n8n versions prior to 1.122.0
Description
n8n, an open source workflow automation platform, is affected by a critical Remote Code Execution (RCE) vulnerability (CVE-2025-68613) with a CVSS score of 9.9. This flaw stems from insufficient isolation in the expression evaluation system, allowing authenticated users to execute arbitrary code with the privileges of the n8n process. Successful exploitation could lead to full system compromise, including unauthorized data access, workflow modification, and system-level operations. Over 100,000 instances are estimated to be exposed. The vulnerability occurs when expressions supplied by authenticated users during workflow configuration are evaluated without proper isolation from the underlying runtime. The
expression evaluation system allows user input to be injected into the runtime without adequate security measures. An attacker can leverage this to execute system commands. The vulnerability affects versions from 0.211.0 up to, but not including, 1.120.4, 1.121.1, and 1.122.0.Recommendations
Upgrade to n8n version 1.120.4 or later.
Upgrade to n8n version 1.121.1 or later.
Upgrade to n8n version 1.122.0 or later.
If upgrading is not immediately possible, limit workflow creation and editing permissions to fully trusted users only.
Deploy n8n in a hardened environment with restricted operating system privileges and network access.
Exploit
Fix
RCE
LPE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-16183
CVE-2025-68613
Affected Products
N8N
References · 169
- 🔥 https://github.com/rxerium/CVE-2025-68613⭐ 29 🔗 3 · Exploit
- 🔥 https://github.com/TheStingR/CVE-2025-68613-POC⭐ 12 · Exploit
- https://github.com/n8n-io/n8n/commit/08f332015153decdda3c37ad4fcb9f7ba13a7c79⭐ 167473 🔗 53276 · Patch
- https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp⭐ 167473 🔗 53276 · Vendor Advisory
- https://github.com/n8n-io/n8n/commit/1c933358acef527ff61466e53268b41a04be1000⭐ 167473 🔗 53276 · Patch
- https://github.com/n8n-io/n8n/commit/39a2d1d60edde89674ca96dcbb3eb076ffff6316⭐ 167473 🔗 53276 · Patch
- https://nvd.nist.gov/vuln/detail/CVE-2025-68613 · Security Note
- https://bdu.fstec.ru/vul/2025-16183 · Security Note
- https://twitter.com/Wh1teCoon/status/2003287349514666387 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1q91dpu/top_10_trending_cves_10012026 · Reddit Post
- https://twitter.com/threatcluster/status/2003563827040825729 · Twitter Post
- https://twitter.com/0xT3chn0m4nc3r/status/2003390141784543510 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1ptr8e6/top_10_trending_cves_23122025 · Reddit Post
- https://twitter.com/BuildHackSecure/status/2003927988942045310 · Twitter Post
- https://twitter.com/Manas_Salian_/status/2008710533709770922 · Twitter Post