CVE-2025-68613

KEV
Published: Dic 19, 2025 Last Modified: Mar 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,9
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,6349
Percentile
1,0th
Updated

EPSS Score Trend (Last 87 Days)

913

Improper Control of Dynamically-Managed Code Resources

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Execute Unauthorized Code Or Commands Varies By Context Alter Execution Logic
Applicable Platforms
Languages: Interpreted, Not Language-Specific
View CWE Details
Application

N8N by N8N

cpe:2.3:a:n8n:n8n:1.121.0:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

N8N by N8N

Version Range Affected
From 0.211.0 (inclusive)
To 1.120.4 (exclusive)
cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-…
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025…
https://github.com/n8n-io/n8n/commit/08f332015153decdda3c37ad4fcb9f7ba13a7c79
https://github.com/n8n-io/n8n/commit/1c933358acef527ff61466e53268b41a04be1000
https://github.com/n8n-io/n8n/commit/39a2d1d60edde89674ca96dcbb3eb076ffff6316
https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp