Agilehunt
Published on

Critical n8n RCE Vulnerability (CVE-2025-68613) Enables Full Server Takeover

Authors
n8n-rce

IMPORTANT

Automation Platforms Are High-Value Targets.
A single workflow vulnerability can expose credentials, internal APIs, and entire cloud environments.
Talk to Agilehunt to assess your automation attack surface.

VULNERABILITY OVERVIEW

A critical remote code execution (RCE) vulnerability tracked as CVE-2025-68613 (CVSS 9.9) has been disclosed in the n8n workflow automation platform.
The flaw allows attackers to execute arbitrary operating system commands on the server hosting n8n, leading to complete instance compromise.

The root cause lies in n8n’s workflow expression evaluation logic. Due to insufficient sandbox isolation, user-controlled expressions can escape their intended execution context. A maliciously crafted expression embedded inside a workflow is enough to break out of the sandbox and interact directly with the host system.

While exploitation requires authentication, no administrative privileges are needed beyond the ability to create or modify workflows — a permission commonly granted in shared or collaborative environments.

RISK BREAKDOWN

  • Risk Level: CRITICAL
  • CVE: CVE-2025-68613
  • CVSS Score: 9.9 / 10
  • Attack Vector: Authenticated expression injection
  • Privileges Required: Workflow creation or edit access

This vulnerability is especially dangerous in self-hosted, internet-facing, or multi-tenant n8n deployments.

AFFECTED VERSIONS & FIXES

Vulnerable Versions

  • n8n 0.211.0 and later
  • All versions prior to the fixed releases

Patched Versions

  • 1.120.4
  • 1.121.1
  • 1.122.0

Earlier mitigations do not fully resolve the issue. Even if partial defenses were applied previously, upgrading to one of the fixed versions is mandatory.

ATTACK SCENARIO

  1. An attacker authenticates to an n8n instance with basic workflow permissions.
  2. A malicious workflow expression is injected during workflow creation or editing.
  3. The expression escapes the sandbox and executes OS-level commands.
  4. The attacker gains control over the n8n host process.

From here, attackers can:

  • Dump environment variables and secrets
  • Access workflow data and credentials
  • Modify or destroy automation logic
  • Pivot into connected internal services and cloud infrastructure

IMPACT

Successful exploitation can result in:

  • Full server compromise
  • Exposure of sensitive workflow data and API keys
  • Credential theft from integrations (cloud, SaaS, databases)
  • Lateral movement into internal networks
  • Service disruption or complete automation failure

For organizations relying on n8n as a central automation backbone, the blast radius can extend far beyond a single application.

CURRENT THREAT LANDSCAPE

As of now, there are no widely published public exploits or confirmed reports of active exploitation in the wild.
However, the low complexity and high impact of this vulnerability make it a prime candidate for rapid weaponization — particularly against exposed automation servers.

History shows that RCE flaws in automation platforms are often exploited quietly to harvest credentials and establish long-term persistence.

AGILEHUNT RECOMMENDATIONS

  • Patch Immediately: Upgrade to n8n 1.120.4, 1.121.1, or 1.122.0 without delay.
  • Restrict Workflow Permissions: Review who can create or edit workflows.
  • Audit Existing Workflows: Look for suspicious or unexpected expressions.
  • Network Segmentation: Isolate n8n instances from critical internal systems.
  • Continuous Security Testing: Automation platforms should be included in regular pentests — not treated as “low risk” tools.

CONCLUSION

CVE-2025-68613 is a reminder that automation engines are execution environments, not just convenience tools.
When expression evaluation, scripting, and integrations intersect, a single flaw can expose an entire organization.

Proactive patching, access control, and security testing are essential to prevent automation platforms from becoming an attacker’s foothold.

WHY AGILEHUNT?

Agilehunt specializes in identifying high-impact, real-world vulnerabilities across:

  • Workflow automation platforms
  • Internal tools and admin panels
  • SaaS, cloud, and CI/CD environments

With over a decade of hands-on offensive security experience, we help teams uncover the risks attackers actually exploit — not just what scanners report.

👉 Before attackers automate their attacks, secure your automation.
Contact Agilehunt for a security review.