PT-2025-52530 · N8N · N8N
Fatihhcelik
·
Published
2025-12-19
·
Updated
2026-03-16
·
CVE-2025-68613
CVSS v3.1
9.9
| Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n versions 0.211.0 through 1.120.3
Description
n8n, an open-source workflow automation platform, is affected by a critical Remote Code Execution (RCE) vulnerability (CVE-2025-68613) with a CVSS score of 9.9. This flaw stems from insufficient isolation in the expression evaluation engine, allowing authenticated users to inject malicious code and execute arbitrary commands with the privileges of the n8n process. Successful exploitation could lead to full system compromise, including unauthorized data access, workflow manipulation, and system-level operations. Over 100,000 instances are estimated to be exposed. The vulnerability allows authenticated users to bypass the sandbox and execute code. Public Proof-of-Concept (PoC) exploits are available.
Recommendations
Upgrade to version 1.120.4, 1.121.1, or 1.122.0 to address this vulnerability. If upgrading is not immediately possible, restrict workflow creation and editing permissions to fully trusted users only and deploy n8n in a hardened environment with restricted operating system privileges and network access.
Exploit
Fix
RCE
LPE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
N8N