Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical n8n Automation Platform Vulnerability Enables RCE Attacks

Critical n8n Automation Platform Vulnerability Enables RCE Attacks

Posted on December 23, 2025December 23, 2025 By CWS

A crucial distant code execution vulnerability has been found in n8n, the open-source workflow automation platform, exposing over 103,000 probably weak situations worldwide.

Tracked as CVE-2025-68613 with a most CVSS severity rating of 9.9. The vulnerability exists inside n8n’s workflow expression analysis system.

The flaw permits authenticated attackers to execute arbitrary code with full course of privileges, probably main to finish system compromise.

FieldDetailsCVE IDCVE-2025-68613 (CVSS 9.9)IssueCritical distant code execution flaw in n8nWhat It DoesAuthenticated attackers can run code and absolutely take over the systemAffected Productn8n workflow automation platformAffected VersionsVersions from 0.211.0 as much as (however not together with) 1.120.4, 1.121.1, and 1.122.0

Vulnerability Particulars

Underneath sure circumstances, expressions entered by authenticated customers are run with out correct isolation, giving them entry to the underlying system.

This design flaw allows attackers with authentic entry to bypass safety boundaries and execute arbitrary code. Profitable exploitation grants attackers unauthorized entry to delicate knowledge saved inside workflows.

The flexibility to switch workflow configurations and execute system-level operations. The impression extends past particular person situations, significantly regarding organizations managing crucial automation processes.

The vulnerability impacts n8n variations ranging from 0.211.0 by means of a number of launch branches.

Patches have been launched throughout three replace tracks:

Replace TrackPatched VersionTrack 11.120.4Track 21.121.1Track 31.122.0

The n8n safety staff strongly recommends upgrading to the newest patched variations. For organizations unable to replace instantly, short-term mitigations embody proscribing workflow creation.

Enhancing permissions to trusted customers solely and deploying n8n in hardened environments with restricted working system privileges and community entry.

Nonetheless, these workarounds don’t remove threat and serve solely as short-term measures.

Exploitation Standing and Intelligence

As of December 19, 2025, the disclosure date, no lively exploitation within the wild has been reported. Nonetheless, SecureLayer7 has revealed a proof-of-concept exploitation information, growing the chance of future assaults.

Censys knowledge reveals the huge scale of publicity, figuring out 103,476 probably weak n8n situations throughout international networks, emphasizing the urgency of patching efforts.

Organizations using n8n ought to prioritize instant patching to the newest out there variations. Safety groups ought to audit workflow permissions, assessment current workflow modifications, and monitor system logs for unauthorized exercise.

Given the crucial nature and broad publicity, treating this as a high-priority safety incident is crucial for shielding automation infrastructure and delicate knowledge.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, Automation, Critical, Enables, n8n, Platform, RCE, Vulnerability

Post navigation

Previous Post: Nissan Confirms Impact From Red Hat Data Breach
Next Post: University of Phoenix Data Breach

Related Posts

Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched Cyber Security News
Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing Cyber Security News
Critical Litecoin Flaw Triggers Network Disruption Critical Litecoin Flaw Triggers Network Disruption Cyber Security News
Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins Cyber Security News
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark