CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,我先快速浏览一下文章。 文章主要讲的是美国网络安全和基础设施安全局(CISA)将一个影响n8n的严重安全漏洞添加到了已知被利用的漏洞目录中。这个漏洞CVE-2025-68613评分9.9,属于表达式注入导致远程代码执行的问题。n8n已经在2025年12月修复了这个漏洞,但目前仍有大量未修补的实例暴露在网络上。 还有提到Pillar Security披露了另外两个关键漏洞,其中一个评分9.4。联邦民事行政部门机构被要求在2026年3月25日前修补他们的n8n实例。 好的,现在我需要把这些信息浓缩到100字以内。重点包括:CISA添加了CVE-2025-68613到KEV目录,这是一个高危漏洞,影响n8n,允许远程代码执行,已经修复但仍有大量暴露实例。另外还有其他漏洞被披露,并且有修补截止日期。 所以总结的时候要涵盖这些要点:CISA添加漏洞、高危、影响n8n、远程代码执行、已修复但未修补实例多、其他漏洞和修补要求。 </think> 美国网络安全机构CISA将影响n8n的高危漏洞CVE-2025-68613(CVSS 9.9)加入已知被利用漏洞目录。该漏洞可导致远程代码执行,已修复但仍有大量未补丁实例暴露。同时披露的其他关键漏洞进一步威胁平台安全。 2026-3-12 05:18:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Vulnerability / Enterprise Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched by n8n in December 2025 in versions 1.120.4, 1.121.1, and 1.122.0. CVE-2025-68613 is the first n8n vulnerability to be placed in the KEV catalog.

"N8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution," CISA said.

According to the maintainers of the workflow automation platform, the vulnerability could be weaponized by an authenticated attacker to execute arbitrary code with the privileges of the n8n process.

Successful exploitation of the flaw could result in a complete compromise of the instance, enabling the attacker to access sensitive data, modify workflows, or execute system-level operations.

There are currently no details on how the vulnerability is being exploited in the wild. Data from the Shadowserver Foundation shows that there are more than 24,700 unpatched instances exposed online, with more than 12,300 of them located in North America and 7,800 in Europe as of early February 2026.

The addition of CVE-2025-68613 comes as Pillar Security disclosed two critical flaws in n8n, one of which – CVE-2026-27577 (CVSS score: 9.4) – has been classified as "additional exploits" discovered in the workflow expression evaluation system following CVE-2025-68613.

Federal Civilian Executive Branch (FCEB) agencies have been ordered to patch their n8n instances by March 25, 2026, as mandated by a Binding Operational Directive (BOD 22-01) issued in November 2021.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/cisa-flags-actively-exploited-n8n-rce.html
如有侵权请联系:admin#unsafe.sh