nomisec
WORKING POC
91 stars
by wioui · poc
https://github.com/wioui/n8n-CVE-2025-68613-exploit
This repository provides a functional exploit for CVE-2025-68613, demonstrating arbitrary code execution in n8n's workflow expression evaluation system. The exploit leverages improper isolation of the execution context to access Node.js system modules via crafted expressions.
Classification
Working Poc 95%
Target:
n8n < v1.122.0
Auth required
Prerequisites:
Authenticated access to n8n instance · Ability to create/edit workflows
nomisec
SCANNER
28 stars
by rxerium · poc
https://github.com/rxerium/CVE-2025-68613
This repository contains a Nuclei template for detecting vulnerable n8n instances affected by CVE-2025-68613, a critical RCE vulnerability in the workflow automation platform. The template extracts version information from the signin page and checks against known vulnerable version ranges.
Classification
Scanner 95%
Target:
n8n Workflow Automation (versions >= 0.211.0 < 1.120.4 or 1.121.0)
No auth needed
Prerequisites:
Access to the n8n signin page
nomisec
WORKING POC
20 stars
by TheStingR · remote-auth
https://github.com/TheStingR/CVE-2025-68613-POC
This repository contains a functional exploit for CVE-2025-68613, an expression injection vulnerability in n8n leading to RCE. It includes a detailed bug fix analysis, scanner, and exploit script with corrected authentication and response parsing logic.
Classification
Working Poc 95%
Target:
n8n Workflow Automation v1.121.0
Auth required
Prerequisites:
Valid credentials for n8n instance · Network access to target
nomisec
WORKING POC
7 stars
by LingerANR · remote-auth
https://github.com/LingerANR/n8n-CVE-2025-68613
This repository contains a functional exploit for CVE-2025-68613, targeting an expression injection vulnerability in n8n that leads to remote code execution (RCE). The exploit authenticates to the n8n instance, creates a malicious workflow with a crafted expression, and executes arbitrary commands via Node.js child_process module.
Classification
Working Poc 95%
Target:
n8n (version not specified)
Auth required
Prerequisites:
Valid credentials for the n8n instance · Network access to the target n8n server
nomisec
SUSPICIOUS
4 stars
by hackersatyamrastogi · remote-auth
https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
The repository claims to be an advanced exploitation framework for CVE-2025-68613 but lacks actual exploit code, instead focusing on marketing language and external dependencies. The README is overly promotional with no technical details about the vulnerability or exploitation mechanics.
Classification
Suspicious 90%
Target:
n8n workflow automation platform
Auth required
Prerequisites:
Valid credentials for n8n instance · Network access to target
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-68613
The repository contains a functional exploit for CVE-2025-68613, an expression injection vulnerability in n8n workflow automation platform that allows authenticated users to achieve remote code execution via Node.js global context access. It includes both detection (scanner) and exploitation tools with multiple payloads.
Classification
Working Poc 95%
Target:
n8n Workflow Automation (versions 0.211.0 through 1.120.3, 1.121.0)
Auth required
Prerequisites:
valid n8n user credentials · network access to target · Python 3.6+ with requests library
nomisec
WORKING POC
2 stars
by mbanyamer · remote-auth
https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
This repository contains a functional exploit for CVE-2025-68613, an authenticated RCE vulnerability in n8n workflow automation tool. The exploit leverages expression injection to bypass the sandbox and execute arbitrary commands via a crafted workflow payload.
Classification
Working Poc 100%
Target:
n8n (versions ≥ 0.211.0 < 1.120.4)
Auth required
Prerequisites:
Valid n8n API key or authentication credentials · Access to the n8n REST API endpoint
nomisec
WRITEUP
1 stars
by Khin-96 · poc
https://github.com/Khin-96/n8n-cve-2025-68613-thm
This repository provides a detailed technical analysis and exploitation walkthrough for CVE-2025-68613, an expression injection vulnerability in n8n workflow automation platform leading to RCE. It includes payload breakdowns, step-by-step exploitation, and detection strategies.
Classification
Writeup 95%
Target:
n8n Workflow Automation Platform (versions 0.211.0 - 1.120.3)
Auth required
Prerequisites:
Authenticated access to n8n instance · Ability to create/modify workflows
nomisec
WRITEUP
1 stars
by Ak-cybe · poc
https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
This repository provides a detailed technical analysis of CVE-2025-68613, a critical RCE vulnerability in n8n workflow automation. It includes root cause analysis, exploitation walkthrough, and mitigation strategies, but does not contain functional exploit code.
Classification
Writeup 95%
Target:
n8n (versions 0.211.0 to 1.120.3, 1.121.0)
Auth required
Prerequisites:
Authenticated access to n8n instance · Workflow creation/editing permissions
nomisec
WORKING POC
1 stars
by JohannesLks · remote-auth
https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
This repository contains a functional Python exploit for CVE-2025-68613, targeting a sandbox escape vulnerability in n8n's expression evaluator. The exploit demonstrates RCE by creating a malicious workflow with a Code node or expression-based payload to execute arbitrary commands.
Classification
Working Poc 95%
Target:
n8n (versions >= 0.211.0 and < 1.120.4, < 1.121.1, < 1.122.0)
Auth required
Prerequisites:
Authenticated access to n8n instance · Network access to target
nomisec
WORKING POC
1 stars
by releaseown · poc
https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613
The repository contains a functional Server-Side Template Injection (SSTI) payload for CVE-2025-68613, which exploits a critical RCE vulnerability in n8n workflow automation platform. The payload leverages JavaScript expression evaluation to execute arbitrary commands via Node.js's child_process module.
Classification
Working Poc 100%
Target:
n8n (versions >= 0.211.0 and < 1.120.4, < 1.121.1, < 1.122.0)
Auth required
Prerequisites:
Authenticated user with workflow edit permissions · Vulnerable n8n instance
nomisec
SCANNER
by manyaigdtuw · poc
https://github.com/manyaigdtuw/CVE-2025-68613_Scanner
This repository contains a Tkinter-based GUI tool designed to scan for publicly exposed n8n instances using Shodan and test them for vulnerability to CVE-2025-68613. It queries Shodan, probes key endpoints, and classifies hosts based on version and connectivity, storing results in a SQLite database.
Classification
Scanner 95%
Target:
n8n (versions ≥ 0.211.0 and < 1.122.0)
No auth needed
Prerequisites:
Python 3.9+ · Shodan account with valid cookie · Network connectivity to target hosts
nomisec
WRITEUP
by intbjw · poc
https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
This repository provides a detailed technical analysis of CVE-2025-68613, an expression injection vulnerability in n8n leading to RCE. It includes root cause analysis, patch diffs, and multiple PoC payloads demonstrating the exploit chain.
Classification
Writeup 100%
Target:
n8n (versions before 1.122.0)
No auth needed
Prerequisites:
Access to n8n workflow expression evaluation · Network access to the target system
nomisec
WORKING POC
by reem-012 · remote
https://github.com/reem-012/poc_CVE-2025-68613
This repository provides a functional Proof of Concept (PoC) for CVE-2025-68613, demonstrating a sandbox escape vulnerability in n8n versions prior to 1.122.0. The PoC includes detailed steps and payloads to exploit the vulnerability, allowing authenticated users to execute arbitrary code on the host system via JavaScript expressions in the workflow editor.
Classification
Working Poc 95%
Target:
n8n versions prior to 1.122.0
Auth required
Prerequisites:
Authenticated access to the n8n interface · Ability to create and modify workflows
nomisec
WORKING POC
by secjoker · remote-auth
https://github.com/secjoker/CVE-2025-68613
This repository contains a functional exploit PoC for CVE-2025-68613, an authenticated RCE vulnerability in n8n workflow automation tool. The exploit leverages the Pocsuite3 framework to create, execute, and clean up malicious workflows that execute arbitrary system commands via Node.js code injection.
Classification
Working Poc 95%
Target:
n8n (all versions)
Auth required
Prerequisites:
Valid X-N8N-API-KEY for authentication
nomisec
WORKING POC
by AbdulRKB · remote-auth
https://github.com/AbdulRKB/n8n-RCE
This repository contains a functional exploit for CVE-2025-68613, demonstrating remote code execution (RCE) in n8n via workflow manipulation. The exploit authenticates, creates a malicious workflow, and executes arbitrary commands through Node.js payload injection.
Classification
Working Poc 95%
Target:
n8n version 1.121.0
Auth required
Prerequisites:
Valid credentials for the target n8n instance · Network access to the n8n API endpoints
nomisec
WORKING POC
by gagaltotal · remote-auth
https://github.com/gagaltotal/n8n-cve-2025-68613
This repository contains a functional exploit PoC and scanner for CVE-2025-68613, an expression injection vulnerability in n8n Workflow Automation Platform leading to authenticated RCE. The exploit supports multiple payloads (info, cmd, env, read, write, revshell) and requires valid credentials.
Classification
Working Poc 95%
Target:
n8n Workflow Automation Platform (versions 0.211.0 to 1.120.3, 1.121.0)
Auth required
Prerequisites:
Valid n8n credentials · Network access to target n8n instance
nomisec
WORKING POC
by ahmedshamsddin · remote-auth
https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
This repository contains a functional exploit for CVE-2025-68613, an authenticated RCE vulnerability in n8n due to unsafe workflow expression evaluation. The exploit includes both a scanner for version detection and a PoC that demonstrates arbitrary code execution via crafted workflow expressions.
Classification
Working Poc 95%
Target:
n8n (versions ≥ 0.211.0, fixed in 1.120.4, 1.121.1, 1.122.0)
Auth required
Prerequisites:
Authenticated access to n8n instance · Vulnerable version of n8n (e.g., 1.121.0)
nomisec
WORKING POC
by shibaaa204 · remote-auth
https://github.com/shibaaa204/CVE-2025-68613
This repository contains a functional proof-of-concept exploit for CVE-2025-68613, demonstrating remote code execution (RCE) in n8n by injecting a JavaScript payload into a workflow node. The exploit leverages Node.js's `child_process` module to execute arbitrary commands.
Classification
Working Poc 95%
Target:
n8n version 1.120.0
Auth required
Prerequisites:
Access to n8n workflow editor · Valid credentials (if authentication is enabled)
nomisec
WORKING POC
by h3raklez · poc
https://github.com/h3raklez/CVE-2025-68613
This repository contains a functional exploit for CVE-2025-68613, an RCE vulnerability in n8n workflow automation platform. The exploit leverages the `executeCommand` node to execute arbitrary OS commands via authenticated workflow creation.
Classification
Working Poc 100%
Target:
n8n >= 0.211.0 < 1.120.4
Auth required
Prerequisites:
authenticated user with workflow creation permissions · target n8n instance
nomisec
WORKING POC
by J4ck3LSyN-Gen2 · poc
https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe
This repository contains a functional exploit for CVE-2025-68613, targeting n8n workflow automation software. The exploit leverages a server-side template injection vulnerability to execute arbitrary commands, demonstrated by reading a flag file.
Classification
Working Poc 90%
Target:
n8n workflow automation
Auth required
Prerequisites:
Access to the n8n workflow editor · Valid credentials for authentication
nomisec
WORKING POC
by intelligent-ears · poc
https://github.com/intelligent-ears/CVE-2025-68613
The repository contains a functional exploit for CVE-2025-68613, targeting n8n workflow automation platform. It includes an automated exploitation template that authenticates, creates a malicious workflow with RCE payload, and extracts system information. Additionally, it provides a version detection template to identify vulnerable instances.
Classification
Working Poc 95%
Target:
n8n Workflow Automation (versions 0.211.0 to 1.120.3, 1.121.0)
Auth required
Prerequisites:
Valid credentials for n8n instance · Network access to target n8n instance
gitlab
WORKING POC
by letchupkt · poc
https://gitlab.com/letchupkt/cve-2025-68613-n8n-rce
This repository contains a functional exploit tool for CVE-2025-68613, targeting n8n workflow automation platform versions 0.211.0 to 1.121.0. The tool supports scanning, authentication-based exploitation, and multiple payload types including interactive shell, command execution, and reverse shell.
Classification
Working Poc 95%
Target:
n8n (0.211.0 to 1.121.0)
Auth required
Prerequisites:
valid credentials for authentication · network access to target n8n instance
nomisec
WORKING POC
by GnuTLam · remote
https://github.com/GnuTLam/POC-CVE-2025-68613
This repository contains a functional Python exploit for CVE-2025-68613, targeting an expression injection vulnerability in n8n. The exploit authenticates, creates a malicious workflow, and executes arbitrary commands via crafted JavaScript payloads.
Classification
Working Poc 95%
Target:
n8n (version not specified)
Auth required
Prerequisites:
Valid credentials for the n8n instance · Network access to the target
nomisec
WORKING POC
by ali-py3 · poc
https://github.com/ali-py3/Exploit-CVE-2025-68613
This repository provides a functional proof-of-concept exploit for CVE-2025-68613, a critical RCE vulnerability in n8n workflow automation tool. The exploit leverages improper sanitization in the expression evaluator to access the Node.js process object and execute arbitrary commands via the child_process module.
Classification
Working Poc 95%
Target:
n8n versions before 1.122.0
Auth required
Prerequisites:
Authenticated access to n8n instance · Permissions to create/edit workflows
nomisec
SCANNER
by nehkark · poc
https://github.com/nehkark/CVE-2025-68613
This repository provides a scanner and safe PoC for CVE-2025-68613, which affects n8n workflow automation due to inadequate expression engine isolation. The tool detects vulnerable versions and validates metadata exposure without performing RCE.
Classification
Scanner 95%
Target:
n8n (versions 0.211.0 to <1.120.4, 1.121.0 to <1.121.1)
Auth required
Prerequisites:
Authenticated access to n8n instance · Vulnerable version of n8n
nomisec
WORKING POC
by sahilccras · poc
https://github.com/sahilccras/Blackash-CVE-2025-68613
The repository contains a functional exploit for CVE-2025-68613, targeting n8n workflow automation. It includes a Python script that creates a malicious workflow to execute arbitrary commands via expression injection, along with a safe scanner to check for vulnerability exposure.
Classification
Working Poc 95%
Target:
n8n workflow automation (versions 0.211.0 to 1.121.0)
Auth required
Prerequisites:
Valid n8n API key · Access to n8n REST API endpoints
nomisec
WRITEUP
by Rishi-kaul · poc
https://github.com/Rishi-kaul/n8n-CVE-2025-68613
This repository provides a comprehensive technical analysis of CVE-2025-68613, a critical RCE vulnerability in n8n's expression evaluation system. It includes root cause analysis, exploitation methodology, detection engineering, and mitigation guidance.
Classification
Writeup 95%
Target:
n8n versions 0.211.0 to 1.120.3
Auth required
Prerequisites:
Authenticated access to n8n instance
nomisec
WORKING POC
by Dlanang · poc
https://github.com/Dlanang/homelab-CVE-2025-68613
This repository provides a functional proof-of-concept for CVE-2025-68613, an expression injection RCE vulnerability in n8n. It includes a Docker setup to reproduce the vulnerability and a step-by-step guide to exploit it via a crafted payload in the n8n workflow.
Classification
Working Poc 90%
Target:
n8n version 1.121.0
Auth required
Prerequisites:
Access to n8n instance · Valid credentials · Ability to create/modify workflows
nomisec
WRITEUP
by Victorhugofariasvieir66 · poc
https://github.com/Victorhugofariasvieir66/relatorio-n8n.md
This repository contains a detailed technical writeup of CVE-2025-68613, an expression injection vulnerability in n8n leading to remote code execution (RCE). It includes steps for exploitation, payload examples, and references to official fixes and advisories.
Classification
Writeup 90%
Target:
n8n (version not specified)
No auth needed
Prerequisites:
Access to n8n instance · Network connectivity to target
nomisec
SUSPICIOUS
by TheInterception · poc
https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads
The repository contains only a README with a disclaimer and no actual exploit code or technical details about CVE-2025-68613. It lacks payloads, proof-of-concept code, or any meaningful analysis of the vulnerability.
Classification
Suspicious 90%
Target:
n8n (version not specified)
No auth needed
nomisec
WORKING POC
by r4j3sh-com · poc
https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
This repository provides a Docker Compose setup for a vulnerable n8n instance (version 1.120.0) and includes functional JavaScript payloads to exploit CVE-2025-68613, demonstrating environment variable exfiltration and remote code execution (RCE) via expression injection.
Classification
Working Poc 95%
Target:
n8n version 1.120.0
Auth required
Prerequisites:
Docker and Docker Compose installed · Access to the n8n web interface with valid credentials
vulncheck_xdb
WORKING POC
remote-auth
https://github.com/releaseown/Analysis-n8n-CVE-2025-68613
The repository contains a functional proof-of-concept exploit for CVE-2025-68613, demonstrating a Server-Side Template Injection (SSTI) vulnerability in n8n workflow automation platform. The exploit leverages JavaScript expressions to achieve Remote Code Execution (RCE) via the `child_process` module.
Classification
Working Poc 95%
Target:
n8n (versions >= 0.211.0 and < 1.120.4, < 1.121.1, < 1.122.0)
Auth required
Prerequisites:
authenticated user with workflow edit permissions · vulnerable n8n instance
metasploit
WORKING POC
EXCELLENT
by Lukas Johannes Möller · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/n8n_workflow_expression_rce.rb
This Metasploit module exploits CVE-2025-68613 in n8n workflow automation by injecting malicious expressions into workflow nodes, leveraging Node.js process access to execute arbitrary commands via child_process.
Classification
Working Poc 95%
Target:
n8n (versions >= 0.211.0 and < 1.120.4, < 1.121.1, < 1.122.0)
Auth required
Prerequisites:
Valid n8n credentials · Network access to n8n instance