Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Active n8n Vulnerability Exploitation

CISA Warns of Active n8n Vulnerability Exploitation

Posted on March 12, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding a critical vulnerability in the n8n workflow automation platform. This flaw, which has been actively exploited, has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, identified as CVE-2025-68613, carries a CVSS score of 9.9, highlighting its severity.

Details of the Security Flaw

The vulnerability is associated with expression injection that results in remote code execution. This serious issue was addressed by n8n in December 2025 with updates in versions 1.120.4, 1.121.1, and 1.122.0. It marks the first n8n-related vulnerability to be cataloged in the KEV list. According to CISA, the flaw involves improper control of dynamically managed code resources, potentially enabling an authenticated attacker to execute arbitrary code.

Exploitation of this vulnerability could lead to a full compromise of the n8n instance, granting attackers the capability to access sensitive information, alter workflows, or perform system-level operations.

Current Exploitation Landscape

While specific exploitation methods have not been disclosed, data from the Shadowserver Foundation reveals that over 24,700 instances remain unpatched and vulnerable, with significant concentrations in North America and Europe. This exposure underscores the urgency for organizations to implement the necessary security patches.

In response to the threat, federal agencies have been instructed to secure their systems by March 25, 2026, as per a Binding Operational Directive issued to mitigate potential risks.

Future Implications and Security Measures

The discovery of CVE-2025-68613 was followed by the identification of additional critical flaws in n8n by Pillar Security, notably CVE-2026-27577, which further exploits weaknesses in the platform’s expression evaluation system. This highlights an ongoing need for vigilance and prompt action in addressing security vulnerabilities.

Organizations using n8n are strongly advised to update their systems immediately to protect against these active threats and safeguard sensitive data.

As cyber threats continue to evolve, staying informed and proactive in patch management remains crucial for maintaining enterprise security.

The Hacker News Tags:CISA, CVE-2025-68613, cyber threat, Cybersecurity, enterprise security, n8n, patch update, RCE, security flaw, Vulnerability, workflow automation

Post navigation

Previous Post: Google Finalizes Historic $32 Billion Wiz Acquisition
Next Post: Google Chrome Update: Fixes 29 Security Vulnerabilities

Related Posts

Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection The Hacker News
Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms The Hacker News
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom The Hacker News
Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover The Hacker News
Warlock Ransomware Exploits Unpatched SmarterMail Server Warlock Ransomware Exploits Unpatched SmarterMail Server The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Office Flaw Allows Dangerous Code Execution
  • Google Chrome Update: Fixes 29 Security Vulnerabilities
  • CISA Warns of Active n8n Vulnerability Exploitation
  • Google Finalizes Historic $32 Billion Wiz Acquisition
  • Enhancing Vulnerability Management in the AI-Driven Era

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Office Flaw Allows Dangerous Code Execution
  • Google Chrome Update: Fixes 29 Security Vulnerabilities
  • CISA Warns of Active n8n Vulnerability Exploitation
  • Google Finalizes Historic $32 Billion Wiz Acquisition
  • Enhancing Vulnerability Management in the AI-Driven Era

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News