CVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-68613 affects n8n, an open-source workflow automation platform widely used for integrating and automating tasks across various services. The issue is categorized under CWE-913, which involves improper control of dynamically-managed code resources. Specifically, the vulnerability exists in the workflow expression evaluation system where expressions provided by authenticated users during workflow configuration are executed in an insufficiently isolated context. This lack of isolation allows an attacker with legitimate workflow configuration access to execute arbitrary code with the same privileges as the n8n process. Since n8n often runs with significant system privileges to perform integrations and automation tasks, exploitation can lead to a complete compromise of the host system, including unauthorized access to sensitive data, modification or creation of malicious workflows, and execution of system-level commands. The vulnerability affects all versions starting from 0.211.0 up to but not including 1.120.4, as well as version 1.121.0. The vendor has released patches in versions 1.120.4, 1.121.1, and 1.122.0 that introduce enhanced safeguards to restrict expression evaluation and isolate execution contexts properly. The CVSS v3.1 score is 10.0, reflecting the critical nature of the vulnerability with network attack vector, low attack complexity, requiring only low privileges but no user interaction, and impacting confidentiality, integrity, and availability with a scope change. No known exploits are reported in the wild yet, but the criticality and ease of exploitation make this a high-priority issue. Temporary mitigations include limiting workflow creation and editing permissions to fully trusted users and deploying n8n instances in hardened environments with restricted OS privileges and network segmentation to reduce potential impact until patches can be applied.
Potential Impact
For European organizations, the impact of this vulnerability is significant. n8n is used by enterprises and service providers to automate workflows that often involve sensitive business data and critical operational processes. Successful exploitation could lead to full system compromise, exposing confidential data, disrupting business operations, and enabling attackers to pivot within networks. This could result in data breaches, intellectual property theft, and operational downtime. The ability to modify workflows also allows attackers to embed persistent malicious automation, increasing the risk of long-term compromise. Given the criticality and the potential for widespread impact, organizations relying on n8n for automation must treat this vulnerability as a top priority. The risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government, where unauthorized access could lead to regulatory penalties under GDPR and other frameworks.
Mitigation Recommendations
1. Immediate upgrade to n8n versions 1.120.4, 1.121.1, or 1.122.0, which contain the official patches addressing this vulnerability. 2. Until upgrades are possible, restrict workflow creation and editing permissions strictly to fully trusted and vetted users to minimize the risk of malicious expression injection. 3. Deploy n8n instances within hardened environments: run with the least privilege principle, using dedicated service accounts with minimal OS permissions. 4. Implement network segmentation and firewall rules to limit n8n’s network exposure, preventing lateral movement in case of compromise. 5. Monitor workflow changes and audit logs closely for suspicious activity indicative of exploitation attempts. 6. Consider containerization or sandboxing of n8n processes to further isolate execution contexts. 7. Regularly review and update access controls and credentials associated with n8n to prevent privilege escalation. 8. Educate administrators and developers on secure workflow design and the risks of dynamic expression evaluation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
Description
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-68613 affects n8n, an open-source workflow automation platform widely used for integrating and automating tasks across various services. The issue is categorized under CWE-913, which involves improper control of dynamically-managed code resources. Specifically, the vulnerability exists in the workflow expression evaluation system where expressions provided by authenticated users during workflow configuration are executed in an insufficiently isolated context. This lack of isolation allows an attacker with legitimate workflow configuration access to execute arbitrary code with the same privileges as the n8n process. Since n8n often runs with significant system privileges to perform integrations and automation tasks, exploitation can lead to a complete compromise of the host system, including unauthorized access to sensitive data, modification or creation of malicious workflows, and execution of system-level commands. The vulnerability affects all versions starting from 0.211.0 up to but not including 1.120.4, as well as version 1.121.0. The vendor has released patches in versions 1.120.4, 1.121.1, and 1.122.0 that introduce enhanced safeguards to restrict expression evaluation and isolate execution contexts properly. The CVSS v3.1 score is 10.0, reflecting the critical nature of the vulnerability with network attack vector, low attack complexity, requiring only low privileges but no user interaction, and impacting confidentiality, integrity, and availability with a scope change. No known exploits are reported in the wild yet, but the criticality and ease of exploitation make this a high-priority issue. Temporary mitigations include limiting workflow creation and editing permissions to fully trusted users and deploying n8n instances in hardened environments with restricted OS privileges and network segmentation to reduce potential impact until patches can be applied.
Potential Impact
For European organizations, the impact of this vulnerability is significant. n8n is used by enterprises and service providers to automate workflows that often involve sensitive business data and critical operational processes. Successful exploitation could lead to full system compromise, exposing confidential data, disrupting business operations, and enabling attackers to pivot within networks. This could result in data breaches, intellectual property theft, and operational downtime. The ability to modify workflows also allows attackers to embed persistent malicious automation, increasing the risk of long-term compromise. Given the criticality and the potential for widespread impact, organizations relying on n8n for automation must treat this vulnerability as a top priority. The risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government, where unauthorized access could lead to regulatory penalties under GDPR and other frameworks.
Mitigation Recommendations
1. Immediate upgrade to n8n versions 1.120.4, 1.121.1, or 1.122.0, which contain the official patches addressing this vulnerability. 2. Until upgrades are possible, restrict workflow creation and editing permissions strictly to fully trusted and vetted users to minimize the risk of malicious expression injection. 3. Deploy n8n instances within hardened environments: run with the least privilege principle, using dedicated service accounts with minimal OS permissions. 4. Implement network segmentation and firewall rules to limit n8n’s network exposure, preventing lateral movement in case of compromise. 5. Monitor workflow changes and audit logs closely for suspicious activity indicative of exploitation attempts. 6. Consider containerization or sandboxing of n8n processes to further isolate execution contexts. 7. Regularly review and update access controls and credentials associated with n8n to prevent privilege escalation. 8. Educate administrators and developers on secure workflow design and the risks of dynamic expression evaluation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-19T14:58:47.823Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6945d4648954746f284878c5
Added to database: 12/19/2025, 10:40:36 PM
Last enriched: 12/19/2025, 10:55:34 PM
Last updated: 12/20/2025, 12:55:36 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighCVE-2023-53958: Weak Password Recovery Mechanism for Forgotten Password in ltb-project LDAP Tool Box Self Service Password
HighCVE-2023-53956: Unrestricted Upload of File with Dangerous Type in altervista flatnux
HighCVE-2023-53951: Improper Verification of Cryptographic Signature in Gauzy ever gauzy
CriticalCVE-2023-53950: Unrestricted Upload of File with Dangerous Type in innovastudio WYSIWYG Editor
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.