ANAVEM
Reference
Languagefr
Computer terminal showing security warning messages in dark server room environment

CISA Adds Critical n8n RCE Flaw to KEV Catalog

CISA added CVE-2025-68613, a critical n8n expression injection vulnerability with active exploitation, to its Known Exploited Vulnerabilities catalog.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
12 Mar 2026, 06:18 2 min read 4

Last updated 16 Mar 2026, 00:59

SEVERITYCritical 9.9/10
CVE IDCVE-2025-68613
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORn8n
AFFECTEDn8n workflow automation platfo...
CATEGORYVulnerabilities

Key Takeaways

CISA Confirms Active Exploitation of n8n Workflow Tool

The U.S. Cybersecurity and Infrastructure Security Agency added a critical n8n vulnerability to its Known Exploited Vulnerabilities catalog on March 12, 2026. The agency cited evidence of active exploitation in the wild targeting the workflow automation platform.

CVE-2025-68613 represents an expression injection flaw that allows attackers to execute arbitrary code remotely. The vulnerability earned a CVSS score of 9.9, placing it in the critical severity category.

n8n Workflow Platform Users at Risk

The vulnerability affects n8n installations across enterprise and individual deployments. Organizations using n8n for workflow automation face immediate risk of system compromise through the expression injection vector.

Federal agencies must patch by the CISA deadline, while private sector organizations should prioritize updates given the confirmed exploitation activity.

Expression Injection Enables Full System Control

Attackers exploit the expression injection weakness to inject malicious code into n8n's workflow processing engine. This technique bypasses input validation and executes commands with the application's privileges.

n8n has released patches addressing the vulnerability. Organizations should update immediately and review logs for suspicious workflow execution patterns. The CISA KEV catalog provides additional guidance for federal agencies facing mandatory patching requirements.

Frequently Asked Questions

What is CVE-2025-68613 and how does it work?+
CVE-2025-68613 is an expression injection vulnerability in n8n that allows attackers to execute arbitrary code remotely. The flaw bypasses input validation in the workflow processing engine, enabling full system compromise.
Is CVE-2025-68613 being actively exploited?+
Yes, CISA confirmed active exploitation of CVE-2025-68613 when adding it to the Known Exploited Vulnerabilities catalog on March 12, 2026. This means attackers are already using this vulnerability in real-world attacks.
How do I protect my n8n installation from CVE-2025-68613?+
Update your n8n installation immediately to the latest patched version. Review your workflow logs for suspicious execution patterns and monitor for unauthorized code injection attempts through expression fields.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...