U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是美国CISA机构将n8n平台的一个严重漏洞加入到已知被利用的漏洞目录中。这个漏洞CVE-2025-68613的CVSS评分是10.0,属于最高级别。n8n是一个工作流自动化平台,被广泛使用,每周下载量高达5.7万次。 漏洞允许经过身份验证的攻击者执行任意代码,可能导致系统完全被控制,数据泄露等严重后果。CISA要求联邦机构在2026年3月25日前修复这个漏洞,并建议用户立即升级到安全版本或采取缓解措施。 所以,我需要把这些关键点浓缩到100字以内。要包括CISA、n8n、漏洞CVE编号、CVSS评分、影响以及修复措施和截止日期。 可能的结构是:CISA将n8n的高危漏洞加入目录,漏洞允许远程代码执行,影响严重,要求机构在指定日期前修复,并建议升级或限制权限。 检查一下字数是否合适,确保信息完整且简洁。 </think> 美国网络安全与基础设施安全局(CISA)将n8n工作流自动化平台中的一个严重漏洞(CVE-2025-68613)添加至已知被利用漏洞目录。该漏洞CVSS评分为10.0,允许经过身份验证的攻击者在特定条件下执行任意代码,可能导致系统完全被控制。CISA要求联邦机构于2026年3月25日前修复此漏洞,并建议用户升级至安全版本或采取缓解措施。 2026-3-12 08:46:25 Author: securityaffairs.com(查看原文) 阅读量:12 收藏

U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in n8n to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an n8n flaw, tracked as CVE-2025-68613 (CVSS score of 10.0), to its Known Exploited Vulnerabilities (KEV) catalog.

n8n is a workflow automation platform designed for technical teams that combines the flexibility of custom code with the speed and simplicity of no-code tools. It supports more than 400 integrations, includes native AI features, and uses a fair-code license, allowing organizations to build powerful automations while retaining full control over their data and deployment environments.

In December 2025, researchers warned that a critical vulnerability, tracked as CVE-2025-68613, in the n8n workflow automation platform could allow attackers to achieve arbitrary code execution under certain circumstances. The package gets about 57,000 downloads per week, according to npm statistics.

“n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime.” reads the advisory. “An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.”

An authenticated attacker could exploit this weakness during workflow configuration to run arbitrary code with the same privileges as the n8n process, potentially leading to full system compromise, data exposure, workflow tampering, and execution of system-level commands. The vulnerability has been fixed in versions 1.120.4, 1.121.1, and 1.122.0, and users are strongly urged to upgrade. If upgrading is not immediately possible, administrators should restrict workflow creation and editing to fully trusted users and run n8n in a hardened environment, keeping in mind these measures only reduce risk temporarily and do not fully resolve the issue.

Cybersecurity firm Censys observed 103,476 potentially vulnerable instances as of December 22, 2025, trackable with the following queries. Most of the instances are located in the U.S., Germany, and France.

Users should install the updates immediately and, if patching isn’t possible, restrict workflow editing to trusted users and run n8n in a hardened environment with restricted operating system privileges and network access.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerability by March 25, 2026.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, US CISA Known Exploited Vulnerabilities catalog)




文章来源: https://securityaffairs.com/189326/security/u-s-cisa-adds-a-flaw-in-n8n-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh