Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances
Overview
A serious vulnerability has been found in the n8n workflow automation platform that could allow attackers to execute arbitrary code on affected systems. This flaw, known as CVE-2025-68613, has a CVSS score of 9.9, indicating a critical risk level. Discovered by security researcher Fatih Çelik, the vulnerability impacts numerous instances of n8n, potentially exposing sensitive workflows and data to exploitation. Organizations using n8n need to take immediate action to secure their systems, as such vulnerabilities can lead to significant data breaches and operational disruptions. Users are urged to monitor for updates and apply necessary patches to mitigate the risk of attack.
Key Takeaways
- Affected Systems: n8n workflow automation platform, all instances affected
- Action Required: Users should apply any available patches or updates from n8n as soon as they are released.
- Timeline: Newly disclosed
Original Article Summary
A critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in arbitrary code execution under certain circumstances. The vulnerability, tracked as CVE-2025-68613, carries a CVSS score of 9.9 out of a maximum of 10.0. Security researcher Fatih Çelik has been credited with discovering and reporting the flaw. The package
Impact
n8n workflow automation platform, all instances affected
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Newly disclosed
Remediation
Users should apply any available patches or updates from n8n as soon as they are released. Regularly monitor n8n's official communication channels for further guidance on securing affected systems.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Vulnerability, Critical.