CISA Adds n8n RCE Flaw to KEV as 24,700 Instances Sit Exposed
CVE-2025-68613 allows authenticated attackers to execute arbitrary code on n8n workflow servers. CISA gives federal agencies until March 25 to patch.
CISA added a critical n8n workflow automation vulnerability to its Known Exploited Vulnerabilities catalog on March 11, marking the first time the popular open-source platform has appeared in the federal tracking list. Over 24,700 unpatched instances remain exposed online.
TL;DR
- What happened: CISA added CVE-2025-68613 to KEV after confirming active exploitation
- Who's affected: Organizations running n8n versions prior to 1.120.4
- Severity: CVSS 9.9 - Critical
- Action required: Patch to version 1.120.4, 1.121.1, or 1.122.0 immediately
The Vulnerability
CVE-2025-68613 is an expression injection flaw in n8n's workflow expression evaluation system. An authenticated attacker can exploit the bug to execute arbitrary code with the same privileges as the n8n process itself.
Successful exploitation gives attackers complete control over the affected instance. From there, they can access sensitive workflow data, modify automation pipelines, pivot to connected systems, or execute commands directly on the underlying server.
The vulnerability affects all n8n versions before 1.120.4. Patches landed in December 2025, but adoption has been slow.
Exposure Remains High
Security researchers tracking vulnerable instances found troubling numbers. As of early March 2026:
- 24,700+ unpatched n8n servers are internet-accessible
- 12,300 of those sit in North America
- 7,800 are located in Europe
- Remaining instances spread across Asia-Pacific and other regions
n8n's popularity as a workflow automation tool makes it attractive to attackers. Organizations use it to connect APIs, automate business processes, and orchestrate data flows between systems. Compromising an n8n instance often means compromising everything it connects to. Similar risks affect other JavaScript-based server tools, as we saw with the jsPDF arbitrary file read vulnerability that exposed Node.js applications.
This isn't the first critical n8n flaw this year. We covered the Ni8mare vulnerability in February, which allowed unauthenticated attackers to take full control of exposed instances. That earlier bug (CVE-2026-21858) carried a perfect CVSS 10.0 score and remains a serious concern for organizations that haven't patched.
Why CISA Added It to KEV
The Known Exploited Vulnerabilities catalog tracks flaws that attackers are actively weaponizing in the wild. CISA doesn't add vulnerabilities speculatively. When something appears in KEV, exploitation is confirmed.
Under Binding Operational Directive 22-01, federal civilian agencies must remediate KEV entries within specified timeframes. For CVE-2025-68613, that deadline is March 25, 2026.
Private sector organizations aren't bound by the directive, but the KEV catalog serves as a prioritization guide. If CISA says attackers are exploiting something, it belongs at the top of your patch queue.
Attack Scenarios
The authentication requirement provides some protection, but n8n instances often have weak or default credentials. Attackers who obtain valid login credentials through credential theft campaigns or password spraying can then chain into full code execution.
Once inside, an attacker could:
- Exfiltrate secrets - n8n workflows frequently contain API keys, database credentials, and OAuth tokens
- Modify workflows - Insert malicious steps that execute during normal automation runs
- Establish persistence - Create new admin accounts or backdoor existing workflows
- Move laterally - Use stored credentials to access connected services
Patch Now
Organizations running n8n should upgrade to version 1.121.1 or later immediately. The fix has been available since December 2025.
If you can't patch immediately:
- Restrict network access - n8n shouldn't be internet-facing without strong access controls
- Audit accounts - Remove unnecessary users and enforce strong passwords
- Enable MFA - Add a second authentication factor for all admin accounts
- Monitor for anomalies - Watch for unusual workflow modifications or execution patterns
The combination of high severity, confirmed exploitation, and widespread exposure makes this one of the more urgent patches of the month. Don't wait for the March 25 deadline if you can act sooner.
Related Articles
Critical n8n Flaw Lets Attackers Execute Code on 100,000+ Instances
CVE-2025-68613 in the workflow automation platform scores CVSS 9.9 with public PoC code now available. Patch to version 1.122.0 immediately.
Dec 24, 2025n8n Sandbox Escape CVE-2026-25049 Bypasses Prior Fix
New n8n RCE flaw bypasses December patch through type confusion. CVSS 9.4 vulnerability enables unauthenticated command execution via malicious workflows.
Feb 15, 2026n8n Patches Five Critical Flaws Including CVSS 9.4 RCE
CVE-2026-25049 bypasses n8n's previous sandbox fix to enable system command execution. Four additional vulnerabilities disclosed simultaneously.
Feb 5, 2026n8n Sandbox Escape Flaws Allow Full Server Compromise
JFrog discloses CVE-2026-1470 and CVE-2026-0863 in workflow automation platform. Both vulnerabilities enable authenticated remote code execution.
Jan 29, 2026