VulnerabilitiesHIGH

CVE-2025-68613 - Zerobot Botnet Exploits Critical Flaw

I4Intel 471 Blog
CVE-2025-68613Zerobotn8nMiraiRCE
🎯

Basically, a botnet is using a serious flaw in n8n software to take control of systems.

Quick Summary

Zerobot botnet exploits a critical flaw in the n8n platform, risking remote code execution. Over 71,000 instances are exposed, raising alarms for users. Immediate updates are crucial to prevent exploitation.

The Flaw

CVE-2025-68613 is a critical vulnerability affecting the n8n workflow automation platform. This flaw allows authenticated attackers to execute remote code, potentially compromising the entire server. With a CVSS score of 9.9, it has a low attack complexity and a high impact on confidentiality, availability, and integrity. The vulnerability lies in n8n’s expression evaluation system, which processes user input in a way that can be exploited.

The vulnerability was disclosed by n8n developers on December 19, 2025, and it requires authentication to exploit. However, this barrier is not insurmountable; attackers can obtain credentials through various means, including brute force attacks or exploiting other vulnerabilities. The first active exploitation was identified in January 2026, marking a concerning trend in the vulnerability's lifecycle.

What's at Risk

As of mid-March 2026, there were over 71,000 exposed n8n instances worldwide, significantly widening the attack surface. The Zerobot botnet, which is based on the Mirai architecture, has been observed leveraging this vulnerability to gain unauthorized access. This type of attack can lead to remote code execution (RCE), allowing attackers to run arbitrary commands on the server.

The risk is compounded by the availability of a public Metasploit module, which simplifies the exploitation process. This means even less sophisticated attackers can weaponize the vulnerability, increasing the likelihood of widespread attacks. The potential for lateral movement within compromised networks further escalates the threat.

Patch Status

The n8n team has addressed this vulnerability in their security advisory, urging users to update to the latest versions of the platform. The remediation deadline set by CISA for federal agencies is March 25, 2026. Users are strongly encouraged to apply these updates as soon as possible to mitigate the risk of exploitation.

Monitoring for unusual activity, such as unexpected child process execution from n8n instances, is crucial. Organizations should be vigilant for indicators of compromise, including specific command executions that could signify active exploitation attempts.

Immediate Actions

To protect against the threat posed by CVE-2025-68613, organizations should take the following steps:

  • Update n8n to the latest version immediately.
  • Monitor for unusual activity on n8n instances, particularly unexpected command executions.
  • Implement strong authentication measures to protect against credential theft.
  • Consider employing network segmentation to limit the impact of potential breaches.

By taking these proactive measures, organizations can significantly reduce their risk of falling victim to the Zerobot botnet and similar threats. Staying informed about vulnerabilities and applying timely updates is essential in today’s evolving threat landscape.

🔒 Pro insight: The availability of a public exploit for CVE-2025-68613 significantly lowers the barrier for entry for attackers, increasing the urgency for patching.

Original article from

Intel 471 Blog

Read Full Article

Related Pings

HIGHVulnerabilities

iPhone Vulnerabilities - DarkSword GitHub Leak Alarms Experts

A leak of DarkSword exploits on GitHub endangers millions of iPhones. Experts warn this democratizes hacking tools, increasing risks for users. Immediate updates are crucial.

CyberScoop·
HIGHVulnerabilities

CVE Program - Funding Concerns Threaten Cyber Defense

The CVE Program is facing funding challenges and questions about its future. This threatens global cybersecurity efforts. Urgent action is needed to secure its sustainability.

Cybersecurity Dive·
HIGHVulnerabilities

Vulnerabilities in Cellular IoT Devices - New Whitepaper Released

A new whitepaper reveals how attackers can exploit cellular IoT devices. This poses significant risks to cloud environments and data security. Organizations must enhance their defenses.

Rapid7 Blog·
CRITICALVulnerabilities

Vulnerabilities - Citrix Patches Critical NetScaler ADC Bug

Citrix has patched a critical vulnerability in NetScaler ADC devices. Organizations using SAML Identity Provider configurations are at risk. Immediate patching is essential to prevent potential data breaches.

SC Media·
HIGHVulnerabilities

LiteLLM - Supply Chain Attack Compromises Python Package

LiteLLM has been compromised due to a supply chain attack via Trivy, exposing user credentials. Users must take immediate action to secure their accounts and rotate any compromised tokens.

The Register Security·
HIGHVulnerabilities

Apple Security Advisory - Critical Vulnerabilities Patched

Apple has issued critical security updates for multiple operating systems. Users must update their devices to avoid serious vulnerabilities. Protecting your data is essential in this digital age.

Canadian Cyber Centre Alerts·