• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa flags actively exploited n8n rce bug as 24,700 instances

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

You are here: Home / General Cyber Security News / CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
March 12, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched by n8n in December 2025 in versions 1.120.4, 1.121.1, and 1.122.0. CVE-2025-68613 is the first n8n vulnerability to be placed in the KEV catalog.

“N8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution,” CISA said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


According to the maintainers of the workflow automation platform, the vulnerability could be weaponized by an authenticated attacker to execute arbitrary code with the privileges of the n8n process.

Cybersecurity

Successful exploitation of the flaw could result in a complete compromise of the instance, enabling the attacker to access sensitive data, modify workflows, or execute system-level operations.

There are currently no details on how the vulnerability is being exploited in the wild. Data from the Shadowserver Foundation shows that there are more than 24,700 unpatched instances exposed online, with more than 12,300 of them located in North America and 7,800 in Europe as of early February 2026.

The addition of CVE-2025-68613 comes as Pillar Security disclosed two critical flaws in n8n, one of which – CVE-2026-27577 (CVSS score: 9.4) – has been classified as “additional exploits” discovered in the workflow expression evaluation system following CVE-2025-68613.

Federal Civilian Executive Branch (FCEB) agencies have been ordered to patch their n8n instances by March 25, 2026, as mandated by a Binding Operational Directive (BOD 22-01) issued in November 2021.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «researchers trick perplexity's comet ai browser into phishing scam in Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
  • Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes
  • Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
  • Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
  • Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
  • What Boards Must Demand in the Age of AI-Automated Exploitation
  • Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
  • UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
  • Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
  • FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Copyright © TheCyberSecurity.News, All Rights Reserved.