Critical n8n Vulnerability (CVE-2025-68613) Allows Remote Code Execution Patch Now

  • December 25, 2025

A critical vulnerability in n8n (CVE-2025-68613) provides remote code execution and system compromise capabilities. Explore the security risk faced by n8n and why applying immediate security patches is very necessary for safeguarding automated processes.

A high-risk vulnerability has been identified in n8n, workflow automation software. This issue (designated CVE-2025-68613) may enable an attacker to run malicious code on an n8n server; its CVSS score is 9.9 (Critical) since it may lead to complete system compromise. Notably, this attack can be easily launched against an unpatched system if it contains at least a low-level account for authenticated access. Thus, if organizations run n8n software, they should patch the software immediately and tighten security against potential malicious actors.

Critical Security Alert
CVE-2025-68613 Analysis
Vulnerability: Expression Injection
Target Platform: n8n Automation
Severity Score
9.9
Critical Impact
Vulnerability Classification
Authenticated Expression Injection leading to Remote Code Execution (RCE)
Affected Range
v0.211.0 v1.121.1
Resolution Patch
v1.122.0+
Advisory: Upgrade immediately. This bypasses the logic sandbox.

Expression Injection: How a Flaw in an n8n Workflow Enables Code Execution

n8n enables users to use dynamic expression syntax in workflow definitions to manipulate data or control workflow logic. However, a vulner- ability was found in n8n’s expression engine that made it not fully sandboxed against the system. This created a situation whereby any attacker with legitimate access to n8n through user logins could craft a malicious expression in a workflow definition to escape its boundaries. The attack can continue as a process where an attacker uses Node.js internals to invoke system commands on the n8n server.

The Impact of This RCE Vulnerability on n8n Users

The effect may be severe. A malicious exploit could culminate into a full-scale attack on the n8n instance. A malicious attacker could do the following:

Impact Analysis
Data Breach
Access and extract sensitive credentials, customer databases, and internal documents handled by n8n.
Workflow Sabotage
Maliciously modify or disable critical automation flows, disrupting core business logic and processes.
System Takeover
Execute OS commands to install malware, create backdoors, or gain persistent control of the host server.
Exposed Online
100,000+
Instances potentially vulnerable globally.
PoC Publicly Available
Proof-of-concept code has been released online, significantly lowering the technical barrier for attackers.
Any unpatched n8n instance is currently an easy target for automated exploitation tools.

For context, more than 100,000 instances of n8n could be at risk based on security scans that have identified them as being potentially exposed on the internet. And to make things worse, there exists already publicly available proof-of-concept exploit code in the wild on this vulnerability. This will make it simpler to attack any unpatched instance of n8n.

Are You at Risk?

In the event that the version range of your n8n installation lies between version 0.211.0 and 1.121.1, then it is most likely affected by CVE-2025-68613. Since it is a severe vulnerability and any user who is logged in to the service is capable of bypassing the expression sandbox and executing arbitrary code on your host machine, it is essential to ensure that your version is updated to at least version 1.122.0 to safeguard your data and infrastructure against such threats if it is directly or indirectly accessed by the public Internet or multiple users.

Are You at Risk?
Verify your n8n deployment against CVE-2025-68613 criteria.
Risk Factors (If any are TRUE, you are at risk)
Running version 0.211.0 — 1.121.1
Instance is accessible via Public Internet
Multiple users have Dashboard Access
Immediate Action Plan
01
Pull Latest Image
Run docker pull n8nio/n8n:latest to patch.
02
Verify Sandbox
Ensure environment variables do not disable security sandboxing.
03
Audit Permissions
Reduce workflow editing rights until the update is applied.
Note: Remote Code Execution (RCE) can lead to total infrastructure compromise. Do not delay patching.

Patch Now: Fixed Versions and Workarounds

It is a relief to note that patches have been introduced to address these issues via n8n versions 1.120.4, 1.121.1, and 1.122.0. It is highly recommended that admins Nevertheless, in the event that the update cannot be made immediately, the following are some temporary solutions that can be employed:

However, if an immediate update is not feasible, there are temporary workarounds:

  • Restrict Workflow Access: Limit the ability to set up or modify the workflow by only giving it to your most trusted users. Doing so reduces the likelihood of an attacker exploiting this vulnerability.
  • Harden the Environment: The n8n should run in an environment that has very limited privileges and access to the network. For instance, it should run inside a locked-down container environment that has very strict firewalls. If the n8n process were to be exploited, it would not have access to much.

It is essential to note that these steps merely help to reduce the attack surface but not eliminate the vulnerability; this is only achieved by the official bug fix.

Conclusion: A Critical Reminder About Automation Risk

The n8n vulnerability exposes a harsh reality of modern automation platforms. When workflow engines can be manipulated to execute system commands, every automated process becomes a potential entry point. No phishing is required. No malware delivery chain is needed. A single abused expression is enough to hand over full control.

Why This Risk Extends Beyond n8n

Automation tools sit at the heart of business operations. They connect APIs, credentials, cloud services, and internal systems. When one of these platforms is compromised, the blast radius is immediate:

  • Trusted workflows become execution engines for attackers
  • Automation servers inherit access to cloud keys and internal services
  • Low-privileged users can trigger high-impact outcomes
  • Patch delays translate directly into system-level compromise

Any environment that allows dynamic code execution without strict isolation is exposed.

Where Xcitium Changes the Outcome

For organizations using Xcitium Advanced EDR, exploitation attempts like CVE-2025-68613 fail at execution.

  • Malicious expressions may run, but code can run without being able to cause damage
  • Escaped Node.js commands cannot impact the real system
  • Workflow abuse cannot lead to persistence, lateral movement, or data loss
  • Automation servers remain operational and protected

Xcitium removes the attacker’s ability to turn automation into a weapon by eliminating execution risk entirely.

Secure Automation Before It Becomes an Attack Path

Automation accelerates business, but it also accelerates attackers. Patching is mandatory. Isolation is essential. Prevention must happen at execution.

Protect the systems that run your workflows.
Choose Xcitium Advanced EDR.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo