CVE-2025-68613

CRITICAL EXPLOITED NUCLEI

n8n Workflow Expression Remote Code Execution

Title source: metasploit

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Exploits (35)

nomisec WORKING POC 91 stars
by wioui · poc
https://github.com/wioui/n8n-CVE-2025-68613-exploit
nomisec SCANNER 28 stars
by rxerium · poc
https://github.com/rxerium/CVE-2025-68613
nomisec WORKING POC 20 stars
by TheStingR · remote-auth
https://github.com/TheStingR/CVE-2025-68613-POC
nomisec WORKING POC 7 stars
by LingerANR · remote-auth
https://github.com/LingerANR/n8n-CVE-2025-68613
nomisec SUSPICIOUS 4 stars
by hackersatyamrastogi · remote-auth
https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-68613
nomisec WORKING POC 2 stars
by mbanyamer · remote-auth
https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
nomisec WRITEUP 1 stars
by Khin-96 · poc
https://github.com/Khin-96/n8n-cve-2025-68613-thm
nomisec WRITEUP 1 stars
by Ak-cybe · poc
https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
nomisec WORKING POC 1 stars
by JohannesLks · remote-auth
https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
nomisec WORKING POC 1 stars
by releaseown · poc
https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613
nomisec SCANNER
by manyaigdtuw · poc
https://github.com/manyaigdtuw/CVE-2025-68613_Scanner
nomisec WRITEUP
by intbjw · poc
https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
nomisec WORKING POC
by reem-012 · remote
https://github.com/reem-012/poc_CVE-2025-68613
nomisec WORKING POC
by secjoker · remote-auth
https://github.com/secjoker/CVE-2025-68613
nomisec WORKING POC
by AbdulRKB · remote-auth
https://github.com/AbdulRKB/n8n-RCE
nomisec WORKING POC
by gagaltotal · remote-auth
https://github.com/gagaltotal/n8n-cve-2025-68613
nomisec WORKING POC
by ahmedshamsddin · remote-auth
https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
nomisec WORKING POC
by shibaaa204 · remote-auth
https://github.com/shibaaa204/CVE-2025-68613
nomisec WORKING POC
by h3raklez · poc
https://github.com/h3raklez/CVE-2025-68613
nomisec WORKING POC
by J4ck3LSyN-Gen2 · poc
https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe
nomisec WORKING POC
by intelligent-ears · poc
https://github.com/intelligent-ears/CVE-2025-68613
gitlab WORKING POC
by letchupkt · poc
https://gitlab.com/letchupkt/cve-2025-68613-n8n-rce
nomisec WORKING POC
by GnuTLam · remote
https://github.com/GnuTLam/POC-CVE-2025-68613
nomisec WORKING POC
by ali-py3 · poc
https://github.com/ali-py3/Exploit-CVE-2025-68613
nomisec SCANNER
by nehkark · poc
https://github.com/nehkark/CVE-2025-68613
nomisec WORKING POC
by sahilccras · poc
https://github.com/sahilccras/Blackash-CVE-2025-68613
nomisec WRITEUP
by Rishi-kaul · poc
https://github.com/Rishi-kaul/n8n-CVE-2025-68613
nomisec WORKING POC
by Dlanang · poc
https://github.com/Dlanang/homelab-CVE-2025-68613
nomisec WRITEUP
by Victorhugofariasvieir66 · poc
https://github.com/Victorhugofariasvieir66/relatorio-n8n.md
nomisec SUSPICIOUS
by TheInterception · poc
https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads
nomisec WORKING POC
by r4j3sh-com · poc
https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
nomisec NO CODE
by cv-sai-kamesh · poc
https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613
vulncheck_xdb WORKING POC
remote-auth
https://github.com/releaseown/Analysis-n8n-CVE-2025-68613
metasploit WORKING POC EXCELLENT
by Lukas Johannes Möller · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/n8n_workflow_expression_rce.rb

Nuclei Templates (1)

n8n - Remote Code Execution via Expression Injection
CRITICALVERIFIEDby rxerium,PentesterFlow,MuhamadJuwandi
Shodan: http.favicon.hash:-831756631

Scores

CVSS v3 9.9
EPSS 0.7898
EPSS Percentile 99.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2026-02-21

Classification

CWE
CWE-913
Status published

Affected Products (2)

n8n/n8n < 1.120.4
npm/n8n < 1.120.4npm

Timeline

Published Dec 19, 2025
Tracked Since Feb 18, 2026