Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Active n8n Vulnerability Exploitation

CISA Warns of Active n8n Vulnerability Exploitation

Posted on March 12, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding a critical vulnerability in the n8n workflow automation platform. This flaw, which has been actively exploited, has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, identified as CVE-2025-68613, carries a CVSS score of 9.9, highlighting its severity.

Details of the Security Flaw

The vulnerability is associated with expression injection that results in remote code execution. This serious issue was addressed by n8n in December 2025 with updates in versions 1.120.4, 1.121.1, and 1.122.0. It marks the first n8n-related vulnerability to be cataloged in the KEV list. According to CISA, the flaw involves improper control of dynamically managed code resources, potentially enabling an authenticated attacker to execute arbitrary code.

Exploitation of this vulnerability could lead to a full compromise of the n8n instance, granting attackers the capability to access sensitive information, alter workflows, or perform system-level operations.

Current Exploitation Landscape

While specific exploitation methods have not been disclosed, data from the Shadowserver Foundation reveals that over 24,700 instances remain unpatched and vulnerable, with significant concentrations in North America and Europe. This exposure underscores the urgency for organizations to implement the necessary security patches.

In response to the threat, federal agencies have been instructed to secure their systems by March 25, 2026, as per a Binding Operational Directive issued to mitigate potential risks.

Future Implications and Security Measures

The discovery of CVE-2025-68613 was followed by the identification of additional critical flaws in n8n by Pillar Security, notably CVE-2026-27577, which further exploits weaknesses in the platform’s expression evaluation system. This highlights an ongoing need for vigilance and prompt action in addressing security vulnerabilities.

Organizations using n8n are strongly advised to update their systems immediately to protect against these active threats and safeguard sensitive data.

As cyber threats continue to evolve, staying informed and proactive in patch management remains crucial for maintaining enterprise security.

The Hacker News Tags:CISA, CVE-2025-68613, cyber threat, Cybersecurity, enterprise security, n8n, patch update, RCE, security flaw, Vulnerability, workflow automation

Post navigation

Previous Post: Google Finalizes Historic $32 Billion Wiz Acquisition
Next Post: Google Chrome Update: Fixes 29 Security Vulnerabilities

Related Posts

Security Flaw in Vertex AI Risks Google Cloud Data Security Flaw in Vertex AI Risks Google Cloud Data The Hacker News
How to Address the Expanding Security Risk How to Address the Expanding Security Risk The Hacker News
AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown The Hacker News
Salesforce Experience Cloud Faces Security Threats Salesforce Experience Cloud Faces Security Threats The Hacker News
Cybercrime Group Recruits Women for IT Vishing Cybercrime Group Recruits Women for IT Vishing The Hacker News
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks
  • Microsoft Unveils Advanced Copilot for Outlook Management
  • Windows PhantomRPC Flaw Lacks Immediate Fix
  • Adapting Security Strategies for Near-Zero Exploit Windows

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks
  • Microsoft Unveils Advanced Copilot for Outlook Management
  • Windows PhantomRPC Flaw Lacks Immediate Fix
  • Adapting Security Strategies for Near-Zero Exploit Windows

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark