{"uuid": "c82de51c-cb21-4745-9d3f-8fa480203d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-68613", "type": "exploited", "source": "https://t.me/tech_b0lt_Genona/5988", "content": "\u0414\u043e\u0441\u0442\u0430\u0451\u043c \u043b\u0438\u0441\u0442\u043e\u0447\u043a\u0438 \u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u043c n8n\n\nThe issue, which affects all versions including and higher than 0.211.0 and below 1.120.4, has been patched in 1.120.4, 1.121.1, and 1.122.0. \n\nCritical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances\nhttps://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html\n\nA critical RCE flaw (CVSS 9.9) was found in the n8n workflow automation platform.\n\nCVE-2025-68613 lets authenticated users execute arbitrary code, enabling full instance takeover, data access, and system-level actions.\n\nMore than 103k exposed instances are observed globally.\n\nhttps://x.com/TheHackersNews/status/2003369435198030215", "creation_timestamp": "2025-12-24T23:49:56.000000Z"}