Critical n8n flaws discovered - here's how to stay safe
techradar.com
- New flaw in n8n (CVE-2026-25049) allows unauthenticated users to run arbitrary commands on servers
- Vulnerability risks theft of secrets (API keys, OAuth tokens) and cross-tenant data exposure
- Patch released in v2.4.0; PoC already public, making immediate updates critical despite temporary workarounds
A critical vulnerability has been found in n8n which allows threat actors to run arbitrary commands on the underlying computers.
In the second half of December 2025, n8n’s developers released CVE-2025-68613, a patch for a critical Remote Code Execution (RCE) vulnerability in the workflow expression evaluation system. Now, security researchers are saying that the patch was inadequate and left exploitable holes.
These holes lead to the same result - escaping the workflow automation platform and taking over the underlying server.


Copyright of this story solely belongs to techradar.com . To see the full text click HERE

