Remote Code Execution Vulnerability in n8n Automation Platform
CVE-2025-68613

10CRITICAL

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
19 December 2025

What is CVE-2025-68613?

n8n, an open-source workflow automation platform, has a Remote Code Execution vulnerability affecting specific versions. Authenticated users can inadvertently supply expressions that, under certain circumstances, are evaluated in a context insufficiently isolated from the runtime. This flaw enables an attacker, if authenticated, to execute arbitrary code, potentially leading to the complete compromise of the n8n instance. This includes unauthorized access to sensitive data, modification of workflows, and system-level operations. Users are advised to upgrade to patched versions 1.120.4 or later, which include safeguards to limit expression evaluation. Temporary mitigations involve restricting workflow permissions and ensuring a hardened deployment environment.

Affected Version(s)

n8n >= 0.211.0, < 1.120.4 < 0.211.0, 1.120.4

n8n = 1.121.0 = 1.121.0

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-68613 : Remote Code Execution Vulnerability in n8n Automation Platform