
Critical n8n RCE Vulnerability (CVE-2025-68613) Endangers Workflow Automation
A critical Remote Code Execution vulnerability (CVE-2025-68613, CVSS 9.9) in the n8n workflow automation platform could allow authenticated attackers to execute arbitrary code with full process privileges, compromising data and workflows. Over 100,000 instances are potentially exposed. This article explains the flaw, affected versions, mitigation steps, and patch guidance.
Introduction
Security researchers have disclosed a critical Remote Code Execution (RCE) vulnerability in the n8n workflow automation platform, tracked as CVE-2025-68613 with a CVSS score of 9.9 (Critical). n8n is an open-source automation tool used widely to orchestrate data flows, integrations, and business logic across enterprise and cloud environments. Under specific conditions, the flaw enables an authenticated user to execute arbitrary code with the privileges of the n8n process, potentially leading to full instance compromise, unauthorized data access, workflow manipulation, and system-level operations.
What happened
The vulnerability stems from how n8n evaluates expressions during workflow configuration. Versions starting at 0.211.0 up to (but not including) 1.120.4, 1.121.1, and 1.122.0 contain the flaw, which arises because user-supplied expressions are evaluated in a context insufficiently isolated from the runtime environment. Authenticated attackers with workflow creation or editing privileges can craft expressions that break out of sandbox boundaries to execute arbitrary code on the host.
Security advisories indicate that over 100,000 internet-exposed n8n instances may still be running affected versions, posing widespread risk to automation infrastructure globally.
Technical details
CVE-2025-68613 is rooted in a weakness in n8n’s workflow expression evaluation system, categorized under CWE-913: Improper Control of Dynamically-Managed Code Resources. When n8n parses and evaluates expressions within workflow nodes, insufficient isolation allows those expressions to access broader runtime objects, enabling them to execute arbitrary operating system commands with the permissions of the n8n process itself.
This class of vulnerability illustrates the risks inherent in dynamic expression engines within automation platforms where user input and code evaluation intersect.
Who is affected and why it matters
The vulnerability impacts self-hosted and on-premise n8n deployments that allow authenticated users to create or edit workflows. Because n8n integrations often connect to internal systems, APIs, and sensitive data stores, successful exploitation not only undermines the automation platform itself but may also serve as a beachhead into broader network resources.
Authenticated users are those with workflow permissions - not strictly administrators - meaning that even automation engineers, integration operators, or service accounts could unwittingly provide an entry point if credentials are compromised or misconfigured.
Mitigations and patch guidance
The n8n development team has released patches that resolve this critical flaw. Vulnerable versions should be upgraded immediately to one of the patched releases: 1.120.4, 1.121.1, or 1.122.0.
Temporary mitigations for environments where immediate upgrading is not possible include:
- Restricting workflow creation and editing permissions to fully trusted users only.
- Running n8n in a hardened execution environment with reduced operating system privileges.
- Restricting network access to the n8n host to trusted internal services only.
These workarounds do not eliminate exploitation risk but may reduce attack surface until patches are applied.
Threat landscape and context
Workflow automation platforms like n8n are increasingly adopted across DevOps, IT operations, and business automation teams because they bridge no-code interfaces with integration logic. However, their flexibility can also introduce security challenges when dynamic expression evaluation intersects with underlying runtime privileges.
In the broader context of automation security, a critical RCE flaw in a platform with deep internal access and integration capabilities represents a significant risk - especially when thousands of instances may be exposed to the internet with default configurations.
Conclusion
CVE-2025-68613 underscores the importance of proactive vulnerability management in modern automation platforms. n8n users and administrators should audit versions immediately, prioritize updating to the latest secure releases, and review access policies to ensure only trusted users can modify workflows.
Failing to address this flaw leaves environments susceptible to full compromise with potentially far-reaching operational and data consequences.
Patch immediately and integrate version monitoring into your vulnerability management processes.
Frequently Asked Questions
It’s a critical Remote Code Execution flaw in the n8n workflow automation platform’s expression evaluation system that can lead to full instance compromise.
Versions from 0.211.0 up to but not including 1.120.4, 1.121.1, and 1.122.0 are vulnerable.
Upgrade to a patched release immediately and restrict workflow editing permissions until all hosts are updated.
Yes, an authenticated user can exploit the flaw over the network to execute arbitrary code with n8n process privileges.
Related Incidents
View All
CriticalShadowLeak and ZombieAgent: Critical ChatGPT Flaws Enable Zero-Click Data Exfiltration from Gmail, Outlook, and GitHub
Security researchers have disclosed critical vulnerabilities in ChatGPT that allowed attackers to silently exfiltrate se...
HighMicrosoft Enforces Mandatory MFA for Microsoft 365 Admin Center as Credential Attacks Surge
Microsoft is now actively enforcing mandatory multi-factor authentication for all accounts accessing the Microsoft 365 A...
MediumCisco ISE XXE Vulnerability Exposes Sensitive Files to Authenticated Attackers After Public PoC Release
Cisco has patched a medium-severity XML External Entity (XXE) vulnerability in Identity Services Engine that allows auth...
Comments
Want to join the discussion?
Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.
New here? Create a free account to get started.