Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

Posted on December 23, 2025December 23, 2025 By CWS

Dec 23, 2025Ravie LakshmananVulnerability / Workflow Automation
A essential safety vulnerability has been disclosed within the n8n workflow automation platform that, if efficiently exploited, might lead to arbitrary code execution below sure circumstances.
The vulnerability, tracked as CVE-2025-68613, carries a CVSS rating of 9.9 out of a most of 10.0. The bundle has about 57,000 weekly downloads, based on statistics on npm.
“Underneath sure circumstances, expressions equipped by authenticated customers throughout workflow configuration could also be evaluated in an execution context that’s not sufficiently remoted from the underlying runtime,” the maintainers of the npm bundle stated.

“An authenticated attacker might abuse this conduct to execute arbitrary code with the privileges of the n8n course of. Profitable exploitation might result in full compromise of the affected occasion, together with unauthorized entry to delicate knowledge, modification of workflows, and execution of system-level operations.”
The difficulty, which impacts all variations together with and better than 0.211.0 and beneath 1.120.4, has been patched in 1.120.4, 1.121.1, and 1.122.0. Per the assault floor administration platform Censys, there are 103,476 doubtlessly weak cases as of December 22, 2025. A majority of the cases are situated within the U.S., Germany, France, Brazil, and Singapore.

In mild of the criticality of the flaw, customers are suggested to use the updates as quickly as doable. If fast patching isn’t an possibility, it is suggested to restrict workflow creation and enhancing permissions to trusted customers and deploy n8n in a hardened surroundings with restricted working system privileges and community entry to mitigate the chance.

The Hacker News Tags:Arbitrary, Code, Critical, CVSS, Enables, Execution, Flaw, Instances, n8n, Thousands

Post navigation

Previous Post: 3.5 Million Affected by University of Phoenix Data Breach
Next Post: CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation

Related Posts

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands The Hacker News
Google Reports Exploitation of Qualcomm Android Vulnerability Google Reports Exploitation of Qualcomm Android Vulnerability The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
DarkSword iOS Kit Exploits Multiple Flaws for Device Control DarkSword iOS Kit Exploits Multiple Flaws for Device Control The Hacker News
U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing 0K Crypto Transfers and M+ Profits U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The Hacker News
Hacktivist Surge: 149 DDoS Attacks Across 16 Nations Hacktivist Surge: 149 DDoS Attacks Across 16 Nations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark