Skip to content

Commit 595dce8

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent eae97b3 commit 595dce8

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112863,6 +112863,66 @@
112863112863
"session_types": false,
112864112864
"needs_cleanup": null
112865112865
},
112866+
"exploit_multi/http/n8n_workflow_expression_rce": {
112867+
"name": "n8n Workflow Expression Remote Code Execution",
112868+
"fullname": "exploit/multi/http/n8n_workflow_expression_rce",
112869+
"aliases": [],
112870+
"rank": 600,
112871+
"disclosure_date": "2025-06-10",
112872+
"type": "exploit",
112873+
"author": [
112874+
"Lukas Johannes Möller"
112875+
],
112876+
"description": "This module exploits a critical remote code execution vulnerability (CVE-2025-68613)\n in the n8n workflow automation platform. The vulnerability exists in the workflow\n expression evaluation system where user-supplied expressions enclosed in {{ }}\n are evaluated in an execution context that is not sufficiently isolated from the\n underlying Node.js runtime.\n\n An authenticated attacker can create a workflow containing malicious expressions\n that access the Node.js process object via this.process.mainModule.require (or via\n the constructor) to load child_process and execute arbitrary system commands.\n This module uses a Schedule Trigger node to automatically fire and evaluate the\n malicious payload. This requires valid credentials to create workflows.\n\n Successful exploitation may lead to full compromise of the n8n instance,\n including unauthorized access to sensitive data, modification of workflows,\n and execution of system-level operations.\n\n Affected versions: >= 0.211.0 and < 1.120.4, < 1.121.1, < 1.122.0",
112877+
"references": [
112878+
"CVE-2025-68613",
112879+
"URL-https://github.com/n8n-io/n8n/security/advisories",
112880+
"URL-https://nvd.nist.gov/vuln/detail/CVE-2025-68613"
112881+
],
112882+
"platform": "Linux,Unix,Windows",
112883+
"arch": "cmd",
112884+
"rport": 5678,
112885+
"autofilter_ports": [
112886+
80,
112887+
8080,
112888+
443,
112889+
8000,
112890+
8888,
112891+
8880,
112892+
8008,
112893+
3000,
112894+
8443
112895+
],
112896+
"autofilter_services": [
112897+
"http",
112898+
"https"
112899+
],
112900+
"targets": [
112901+
"Unix/Linux Command",
112902+
"Windows Command"
112903+
],
112904+
"mod_time": "2026-01-13 16:31:01 +0000",
112905+
"path": "/modules/exploits/multi/http/n8n_workflow_expression_rce.rb",
112906+
"is_install_path": true,
112907+
"ref_name": "multi/http/n8n_workflow_expression_rce",
112908+
"check": true,
112909+
"post_auth": true,
112910+
"default_credential": false,
112911+
"notes": {
112912+
"Stability": [
112913+
"crash-safe"
112914+
],
112915+
"Reliability": [
112916+
"repeatable-session"
112917+
],
112918+
"SideEffects": [
112919+
"ioc-in-logs",
112920+
"artifacts-on-disk"
112921+
]
112922+
},
112923+
"session_types": false,
112924+
"needs_cleanup": null
112925+
},
112866112926
"exploit_multi/http/nas4free_php_exec": {
112867112927
"name": "NAS4Free Arbitrary Remote Code Execution",
112868112928
"fullname": "exploit/multi/http/nas4free_php_exec",

0 commit comments

Comments
 (0)