CISA alert on CVE 2025 68613 update n8n already to protect secrets and avoid intrusions

Published 4 min de lectura 97 reading

The U.S. government cybersecurity agency. United States, CISA has ordered the federal units to update their n8n facilities as a matter of urgency after a vulnerability that is already being exploited in real environments. This is a serious warning because n8n is not a marginal tool: it works as a very popular workflow automation engine in data science and artificial intelligence projects and in data ingestion channels, with a wide user community and mass downloads both in npm as in Docker Hub.

The failure, recorded as CVE-2025-68613, allows remote execution of code on vulnerable servers through the system that evaluates expressions within workflows. In practical terms, an authenticated attacker could get the n8n process to execute arbitrary commands and therefore compromise the complete instance with the credentials of the service itself. That makes every facility a potential store of secrets and a very juicy goal.

CISA alert on CVE 2025 68613 update n8n already to protect secrets and avoid intrusions
Image generated with IA.

The reason this vulnerability is so dangerous is not just the possibility of remote execution, but the kind of information that automation platforms usually contain: API keys, tokens OAuth, database credentials, cloud storage permits and even secrets used in continuous integration processes. Successful access can result in data theft, automated flow manipulation and side movements within the network.

The n8n team published the correction in December in the version v1.122.0 and has recommended that managers implement the update immediately. For organizations that cannot update immediately, developers suggest temporary measures such as restricting the creation and editing of flows to fully reliable users and limiting privileges at the operating system level and network access, with the aim of reducing the attack surface until the patch is applied.

The urgency of the situation became apparent when CISA added this vulnerability to its catalogue of Known Exploited Vulnerabilities (KEV) and required the agencies of the Federal Executive to remedy the bodies concerned by 25 March, in accordance with the binding operational directive BOD 22-01. Although this mandate affects only federal entities, CISA has urged all security officials to act without delay.

Internet exposure indicators amplify the call for action: the Shadowserver surveillance group has identified more than 40,000 unpatched n8n instances accessible from the public network, with a significant concentration in North America and Europe. This scale suggests that not only automated attackers, but targeted actors, have a large field of action to search and exploit unprotected facilities. The Shadowserver follow-up is available on your public panel. Here..

In addition to the specific correction for CVE-2025-68613, the n8n project itself has seen several critical failures in recent months, including a so-called "Ni8mare" that allowed remote attackers without privileges to be made with non-patched servers. This recent record reinforces the idea that the platforms that process automatisms and secrets require continuous management and monitoring, not just point patches.

CISA alert on CVE 2025 68613 update n8n already to protect secrets and avoid intrusions
Image generated with IA.

If you manage n8n instances, it is appropriate to act on several fronts: to identify all the facilities within the organization's inventory, to plan the update to the parcheed version, to rotate keys and credentials that may have been exposed and to review logs and detections in search of abnormal activity. In environments where the update is not immediate, apply strict access controls, segment the network and limit the ability of n8n processes to run commands on the system can mitigate risks until official correction is available. The CISA notice also recalls that, if there are no viable mitigation, the responsible alternative is to stop using the product temporarily.

For further information, see the CISA note on the inclusion of vulnerability in its catalogue. Here. technical information in the national vulnerability register NVD and the safety notice published by the n8n team itself in its GitHub repository, available Here.. These sources offer the concrete steps for patching, as well as additional recommendations to reduce impact if they cannot update immediately.

In short, the combination of a widely used tool, the ability to run code at process level and the presence of thousands of exposed instances makes CVE-2025-68613 one of those vulnerabilities that should not be ignored. Updating as soon as possible, auditing access and rotating secrets are essential actions to avoid intrusion with serious consequences.

Coverage

Related

More news on the same subject.