Critical n8n bugs discovered – here’s how to stay safe


  • New flaw in n8n (CVE-2026-25049) allows unauthorized users to run arbitrary commands on servers
  • Vulnerability risks theft of secrets (API keys, OAuth tokens) and cross-tenant data exposure
  • Patch released in v2.4.0; The PoC is already public, making immediate updates critical despite workarounds

A critical vulnerability has been found in n8n that allows threat actors to execute arbitrary commands on the underlying computers.

In the second half of December 2025, n8ns developers released CVE-2025-68613, a patch for a critical Remote Code Execution (RCE) vulnerability in the workflow expression evaluation system. Now security researchers say the patch was inadequate and left exploitable holes.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top