CISA Says N8n Critical Bug Exploited in Real-World Attacks
CISA added CVE-2025-68613 to its Known Exploited Vulnerabilities catalog and mandated patching by March 25 for federal agencies to prevent remote code execution attacks.
6 Articles
6 Articles
CISA Warns Hackers Are Exploiting Critical n8n Vulnerability
A serious security flaw in a widely used automation platform has caught the attention of U.S. cyber defenders. The Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability affecting n8n, a workflow automation tool used to connect apps and automate tasks, to its Known Exploited Vulnerabilities Catalog. The move signals that attackers are already taking advantage of the bug in real-world attacks. The vulnerability, tracked…
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog bjackson Mar 11, 2026 Release DateMarch 11, 2026 DescriptionCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources VulnerabilityThis type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to …
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium




