Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-68613 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: n8n Workflow Automation has a critical isolation flaw in its expression evaluation system. πŸ’₯ **Consequences**: Attackers can achieve **Remote Code Execution (RCE)**, completely compromising the server.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-913** (Overly Complex System). The isolation between the workflow expression evaluator and the host environment is insufficient. ⚠️ It allows malicious expressions to break out of their sandbox.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: β€’ 0.211.0 to 1.120.4 β€’ 1.121.1 β€’ 1.122.0 (and earlier) 🏒 **Vendor**: n8n-io. If you use these versions, you are in the danger zone! 🎯

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Attacker Power**: Full **RCE**! πŸ–₯️ Hackers can execute arbitrary commands on the server. They can steal data, install backdoors, or pivot to other internal systems.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Exploitation Threshold**: **Low**. β€’ **Network**: Remote (AV:N) β€’ **Complexity**: Low (AC:L) β€’ **Auth**: Requires Low Privileges (PR:L) - likely a valid user account. β€’ **UI**: No interaction needed (UI:N).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploits**: **YES**. Multiple PoCs are live on GitHub (e.g., rxerium, Ashwesker, TheStingR). Wild exploitation is highly likely. 🌍 The community has already released scanners and full exploits.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check your n8n version immediately! πŸ“ 2. Use the provided GitHub PoC scanners to detect vulnerability. πŸ”Ž 3. Look for unusual workflow expressions or unexpected server processes. πŸ‘€

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. Patches are available via GitHub commits (e.g., 39a2d1d, 08f3320). πŸ› οΈ Check the GitHub Security Advisory (GHSA-v98v-ff95-f3cp) for the specific fixed version. Update ASAP!

Q9What if no patch? (Workaround)

🚧 **No Patch?**: β€’ **Isolate**: Restrict network access to n8n instances. 🚫 β€’ **Disable**: Turn off workflow expression evaluation if possible. β›” β€’ **Monitor**: Watch for suspicious command executions.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL (Priority 1)**. CVSS Score is effectively **10.0** (Critical). With public exploits available, immediate patching is mandatory. Don't wait! β³πŸ’¨