Critical n8n flaws discovered – here’s how to stay safe



  • New flaw in n8n (CVE-2026-25049) allows unauthenticated users to run arbitrary commands on servers
  • Vulnerability risks theft of secrets (API keys, OAuth tokens) and cross-tenant data exposure
  • Patch released in v2.4.0; PoC already public, making immediate updates critical despite temporary workarounds

A critical vulnerability has been found in n8n which allows threat actors to run arbitrary commands on the underlying computers.

In the second half of December 2025, n8n’s developers released CVE-2025-68613, a patch for a critical Remote Code Execution (RCE) vulnerability in the workflow expression evaluation system. Now, security researchers are saying that the patch was inadequate and left exploitable holes.


https://cdn.mos.cms.futurecdn.net/t4PaWXVbkqSp2Ed6ykbFsi-2116-80.png



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img