Description

The workflow automation platform n8n has issued a critical security advisory after discovering a severe vulnerability that could allow complete compromise of affected instances. The flaw, tracked as CVE-2025 -68613, has been assigned a CVSS score of 10.0, highlighting the immediate risk to unpatched systems. The issue is a remote code execution vulnerability caused by insufficient isolation in n8n’s workflow expression evaluation system. While the platform’s flexibility allows users to define dynamic expressions within workflows, this same capability can be abused. Under certain conditions, expressions provided by an authenticated user are evaluated in a context that allows malicious code to escape the intended sandbox and run directly on the server. An attacker with valid access and workflow editing privileges can exploit this flaw to execute arbitrary commands with the same permissions as the n8n process. Successful exploitation can result in unauthorized access to sensitive data, manipulation or disruption of workflows, and full server takeover. Because n8n often integrates with databases, APIs, and other business systems, a compromise could enable wider network impact. n8n has released a fix in version 1.122.0 and strongly urges all users to upgrade immediately. For organizations unable to update right away, temporary mitigations include limiting workflow creation and editing rights to trusted users and deploying n8n in a hardened environment with restricted system and network privileges.