CVE-2025-68613 — n8n n8n: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
CVE-2025-68613 — n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.
What This Means For You
- CISA has confirmed active exploitation — immediate patching required.
- Added to CISA KEV catalog — federal agencies must remediate by 2026-03-25.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2025-68613 | RCE | n8n workflow expression evaluation system allows for remote code execution |
| CVE-2025-68613 | Code Injection | n8n workflow expression evaluation system |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | CISA |
| Channel | CISA KEV |
| Published | March 11, 2026 at 14:00 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.