CVE-2025-68697

n8n · n8n

A high-severity vulnerability has been identified in the n8n open-source workflow automation platform.

Executive summary

A high-severity vulnerability has been identified in the n8n open-source workflow automation platform. Successful exploitation could allow an attacker to compromise the underlying server, potentially leading to unauthorized access to sensitive data, disruption of critical business workflows, and lateral movement across the network. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability exists within the data processing component of n8n when handling specially crafted input for certain workflow nodes. An authenticated attacker with permissions to create or edit workflows can configure a node with malicious parameters. When the workflow is executed, these parameters are not properly sanitized, leading to a command injection condition that allows the attacker to execute arbitrary commands on the host operating system with the privileges of the n8n service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.1. Exploitation could have a severe impact on business operations. Since n8n platforms are often integrated with critical systems and hold credentials for databases, APIs, and other services, an attacker could exfiltrate sensitive company and customer data, tamper with or disable essential automated processes, or use the compromised n8n server as a pivot point to attack other internal systems. The potential consequences include significant data breaches, financial loss, operational downtime, and reputational damage.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected n8n instances without delay. After patching, it is crucial to review access logs and workflow execution histories for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes looking for unusual or unexpected outbound network connections from the n8n server, reviewing logs for suspicious command executions (e.g., whoami, curl, wget), and auditing workflows for any unauthorized or anomalous modifications.

Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. These include restricting network access to the n8n management interface, placing the n8n instance behind a Web Application Firewall (WAF) with rules to detect command injection patterns, and enforcing strict access controls to limit which users can create or modify workflows.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity rating and the critical role of workflow automation platforms in business operations, this vulnerability presents a significant risk. We strongly recommend that organizations prioritize the immediate deployment of vendor-supplied patches to all n8n instances. Although this CVE is not currently listed on the CISA KEV list, its potential for enabling data exfiltration and lateral movement warrants urgent attention. Organizations should treat this as a critical priority and implement the recommended monitoring and compensating controls to ensure a robust defense-in-depth posture.