
[CIVN-2025-0387] Remote Code Execution Vulnerability in n8n Workflow Automation Platform
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in n8n Workflow Automation Platform
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
n8n Workflow Automation Platform versions prior to 1.120.4, 1.121.1, and 1.122.0
Overview
A critical vulnerability has been reported in n8n Workflow Automation Platform, which could be exploited by an authenticated attacker to execute arbitrary code on the targeted system.
Target Audience:
System administrators, DevOps teams and organizations deploying or managing n8n Workflow Automation Platform.
Risk Assessment:
High risk of system compromise, unauthorized execution of commands, exposure of sensitive workflow data and credentials, and potential lateral movement within the affected environment.
Impact Assessment:
Successful exploitation could result in complete compromise of the affected n8n instance, unauthorized access to sensitive information, modification of workflows, or disruption of services.
Description
n8n is an open-source workflow automation platform used to design, execute and manage automated workflows that integrate applications, services and APIs.
A remote code execution vulnerability exists in n8n due to improper isolation of workflow expression evaluation logic.
An authenticated attacker with workflow creation or modification privileges could exploit this flaw by crafting malicious expressions, resulting in execution of arbitrary code with the privileges of the n8n service process.
Successful exploitation of this vulnerability could allow an attacker to fully compromise the affected system, access sensitive data processed by workflows, modify automation logic, or disrupt service availability.
Solution
Apply appropriate updates as mentioned by the vendor:
https://n8n.io/security
Vendor Information
n8n Workflow Automation Platform
https://n8n.io/
CVE Name
CVE-2025-68613
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=1Jia
—–END PGP SIGNATURE—–


