Improper Control of Dynamically-Managed Code Resources Affecting n8n-workflow package, versions <1.118.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked
EPSS
78.98% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-N8NWORKFLOW-14545463
  • published21 Dec 2025
  • disclosed19 Dec 2025
  • creditFatih Çelik

Introduced: 19 Dec 2025

CVE-2025-68613  (opens in a new tab)
CWE-913  (opens in a new tab)

How to fix?

Upgrade n8n-workflow to version 1.118.1 or higher.

Overview

n8n-workflow is a Workflow base code of n8n

Affected versions of this package are vulnerable to Improper Control of Dynamically-Managed Code Resources via the workflow expression evaluation system. An authenticated attacker can execute arbitrary code with the privileges of the underlying process by supplying crafted expressions during workflow configuration. This may result in full compromise of the instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Workaround

This vulnerability can be mitigated by limiting workflow creation and editing permissions to fully trusted users only, and/or deploying the application in a hardened environment with restricted operating system privileges and network access. These measures do not fully eliminate the risk and should only be used as temporary mitigations.

CVSS Base Scores

version 4.0
version 3.1