Users of over 103,000 exposed instances
A critical vulnerability, CVE-2025-68613, has been discovered in the popular open-source workflow automation platform n8n. Rated 9.9 on the CVSS scale, this flaw allows for remote code execution (RCE) and affects an estimated 103,000 publicly exposed instances. The vulnerability can be exploited by any authenticated user with permissions to create or edit workflows, a common privilege level. Successful exploitation allows an attacker to execute arbitrary operating system commands, leading to a complete compromise of the host server. Given that n8n is often used as a central hub for connecting sensitive APIs and services, this vulnerability poses a severe risk of data theft and lateral movement across an organization's infrastructure. Administrators are strongly advised to update to a patched version immediately.
The vulnerability is an expression injection flaw within n8n's workflow definition processing logic. The platform's sandboxing mechanism, intended to isolate workflow executions, is insufficient. A low-privileged, authenticated attacker can craft a malicious expression within a workflow that escapes this sandbox. This allows the expression to access and execute commands on the underlying operating system with the same privileges as the n8n process itself. This constitutes a classic RCE scenario, where an attacker can turn limited application access into full server control.
An attack would involve the following steps:
The vulnerability impacts a wide range of n8n versions:
0.211.0 up to, but not including, the patched versions.Patched versions that resolve this vulnerability are:
1.120.41.121.11.122.0Any self-hosted n8n instance within the vulnerable version range is at risk, particularly the more than 103,000 instances identified as being publicly accessible on the internet.
As of December 26, 2025, there were no public reports of this vulnerability being actively exploited in the wild. However, due to the critical severity, the large number of exposed instances, and the relative ease of exploitation for an authenticated attacker, the potential for widespread attacks is high. Security researchers anticipate that threat actors will quickly develop and deploy exploits targeting this flaw.
A successful exploit of CVE-2025-68613 can have devastating consequences. Since n8n workflows often store credentials, API keys, and access tokens for various services (databases, cloud platforms, SaaS applications), an attacker compromising the n8n server can exfiltrate this sensitive data. This enables Credential Access (TA0006) on a massive scale. With this access, the attacker can:
T1219 - Remote Services).sh, bash, powershell.exe). This is a key indicator of a successful RCE exploit. This aligns with D3-PCA: Process Creation Analysis.1.120.4, 1.121.1, 1.122.0 or later). This directly remediates the vulnerability. This is a direct application of D3-SU: Software Update.Upgrade to a patched version of n8n to eliminate the vulnerability.
Mapped D3FEND Techniques:
Run n8n in a containerized and hardened environment to limit the impact of a potential compromise.
Mapped D3FEND Techniques:
Restrict workflow creation and editing permissions to only trusted administrators as a temporary mitigation.
Mapped D3FEND Techniques:
Limit network access to the n8n instance and restrict its outbound connections to only necessary endpoints.
Mapped D3FEND Techniques:
The definitive countermeasure for CVE-2025-68613 is to immediately upgrade all n8n instances to a patched version (1.120.4, 1.121.1, 1.122.0, or newer). Given the 9.9 CVSS score and the low-privilege authenticated attack vector, this should be treated as an emergency change. Use asset inventory systems to identify all n8n deployments, including shadow IT instances. Prioritize patching for internet-facing servers and those connected to sensitive data sources or critical applications. After patching, verify the update was successful by checking the version in the n8n UI or via the command line. This action completely removes the expression injection vulnerability, providing the most effective protection.
As a temporary compensating control if patching is delayed, conduct an immediate audit of all user permissions within the n8n platform. Revoke the ability to create or edit workflows from all non-essential users. This permission should be restricted to a very small group of highly trusted administrators. This action significantly reduces the attack surface by limiting the number of accounts that could be used to inject a malicious expression. While this does not fix the underlying RCE vulnerability, it makes exploitation much more difficult by raising the bar for the attacker from compromising any user account to compromising a privileged administrator account. This should be paired with enhanced monitoring of administrator activity.
Configure EDR and server logging to monitor for anomalous child processes spawned by the main n8n process. The n8n application should not be executing system shells like bash, sh, cmd.exe, or powershell.exe. Create high-priority alerts in your SIEM or security monitoring platform to trigger an immediate investigation if the n8n process spawns any of these interpreters. This is a high-fidelity indicator of a successful RCE exploit. The alert should trigger an automated response to isolate the host server from the network to prevent lateral movement or data exfiltration while the incident is investigated. This detection-in-depth approach provides a critical safety net to catch exploitation attempts that bypass other preventative controls.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats