Critical n8n flaws discovered – here’s how to stay safe

Critical n8n flaws discovered – here’s how to stay safe


  • New flaw in n8n (CVE-2026-25049) allows unauthenticated users to run arbitrary commands on servers
  • Vulnerability risks theft of secrets (API keys, OAuth tokens) and cross-tenant data exposure
  • Patch released in v2.4.0; PoC already public, making immediate updates critical despite temporary workarounds

A critical vulnerability has been found in n8n which allows threat actors to run arbitrary commands on the underlying computers.

In the second half of December 2025, n8n’s developers released CVE-2025-68613, a patch for a critical Remote Code Execution (RCE) vulnerability in the workflow expression evaluation system. Now, security researchers are saying that the patch was inadequate and left exploitable holes.


link

Leave a Reply

Your email address will not be published. Required fields are marked *