HomeSample Page

Sample Page Title


Dec 23, 2025Ravie LakshmananVulnerability / Workflow Automation

Vital n8n Flaw (CVSS 9.9) Allows Arbitrary Code Execution Throughout 1000’s of Cases

A essential safety vulnerability has been disclosed within the n8n workflow automation platform that, if efficiently exploited, may end in arbitrary code execution below sure circumstances.

The vulnerability, tracked as CVE-2025-68613, carries a CVSS rating of 9.9 out of a most of 10.0. Safety researcher Fatih Çelik has been credited with discovering and reporting the flaw. The bundle has about 57,000 weekly downloads, in accordance with statistics on npm.

“Below sure situations, expressions equipped by authenticated customers throughout workflow configuration could also be evaluated in an execution context that isn’t sufficiently remoted from the underlying runtime,” the maintainers of the npm bundle stated.

Cybersecurity

“An authenticated attacker may abuse this habits to execute arbitrary code with the privileges of the n8n course of. Profitable exploitation might result in full compromise of the affected occasion, together with unauthorized entry to delicate information, modification of workflows, and execution of system-level operations.”

The difficulty, which impacts all variations together with and better than 0.211.0 and under 1.120.4, has been patched in 1.120.4, 1.121.1, and 1.122.0. Per the assault floor administration platform Censys, there are 103,476 probably susceptible situations as of December 22, 2025. A majority of the situations are situated within the U.S., Germany, France, Brazil, and Singapore.

In gentle of the criticality of the flaw, customers are suggested to use the updates as quickly as potential. If quick patching just isn’t an possibility, it is suggested to restrict workflow creation and modifying permissions to trusted customers and deploy n8n in a hardened setting with restricted working system privileges and community entry to mitigate the danger.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles