# n8n 表达式注入远程代码执行漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Detection for CVE-2025-68613 | https://github.com/rxerium/CVE-2025-68613 | POC详情 |
| 2 | CVE-2025-68613 | https://github.com/Ashwesker/Blackash-CVE-2025-68613 | POC详情 |
| 3 | Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance. | https://github.com/TheStingR/CVE-2025-68613-POC | POC详情 |
| 4 | CVE-2025-68613: n8n RCE vulnerability exploit and documentation | https://github.com/wioui/n8n-CVE-2025-68613-exploit | POC详情 |
| 5 | 通过GitHub Copilot 辅助分析CVE-2025-68613漏洞 | https://github.com/intbjw/CVE-2025-68613-poc-via-copilot | POC详情 |
| 6 | None | https://github.com/ali-py3/Exploit-CVE-2025-68613 | POC详情 |
| 7 | This repository contains a laboratory-grade analysis and a **safe Proof-of-Concept** for the vulnerability **CVE-2025-68613**, affecting the workflow automation platform **n8n**. | https://github.com/nehkark/CVE-2025-68613 | POC详情 |
| 8 | My poc to exploit this vuln :D | https://github.com/GnuTLam/POC-CVE-2025-68613 | POC详情 |
| 9 | n8n < 1.120.4, 1.121.1, 1.122.0 contains a remote code execution caused by insufficient isolation in workflow expression evaluation, letting authenticated attackers execute arbitrary code with n8n process privileges. Exploit requires authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-68613.yaml | POC详情 |
| 10 | 基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE) | https://github.com/secjoker/CVE-2025-68613 | POC详情 |
| 11 | Analysis of CVE-2025-68613 | https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab | POC详情 |
| 12 | None | https://github.com/intelligent-ears/CVE-2025-68613 | POC详情 |
| 13 | GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0) | https://github.com/manyaigdtuw/CVE-2025-68613_Scanner | POC详情 |
| 14 | Remote Code Execution via n8n Workflows (Based on CVE-2025-68613) | https://github.com/AbdulRKB/n8n-RCE | POC详情 |
| 15 | Python Exploit for CVE-2025-68613. | https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit | POC详情 |
| 16 | n8n God Mode Ultimate - CVE-2025-68613 Scanner v1.0.0 ║ ║ Workflow Automation Remote Code Execution | https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate | POC详情 |
| 17 | Proof-of-Concept exploit for CVE-2025-68613: Authenticated Remote Code Execution in n8n via Expression Injection | https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613 | POC详情 |
| 18 | Technical study of the CVE-2025-68613 vulnerability in n8n, covering affected versions, laboratory exploration scenario, offensive and defensive analysis, and mitigation strategies. | https://github.com/releaseown/Analysis-n8n-CVE-2025-68613 | POC详情 |
| 19 | None | https://github.com/Dlanang/homelab-CVE-2025-68613 | POC详情 |
| 20 | None | https://github.com/Khin-96/n8n-cve-2025-68613-thm | POC详情 |
| 21 | The minor methodology for room: https://tryhackme.com/room/n8ncve202568613 | https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe | POC详情 |
| 22 | CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips) | https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis | POC详情 |
| 23 | This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance. | https://github.com/LingerANR/n8n-CVE-2025-68613 | POC详情 |
| 24 | POC for CVE-2025-68613 | https://github.com/reem-012/poc_CVE-2025-68613 | POC详情 |
| 25 | Technical study of the CVE-2025-68613 vulnerability in n8n, covering affected versions, laboratory exploration scenario, offensive and defensive analysis, and mitigation strategies. | https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613 | POC详情 |
| 26 | n8n CVE-2025-68613 | https://github.com/gagaltotal/n8n-cve-2025-68613 | POC详情 |
| 27 | CVE-2025-68613 | https://github.com/Ashwesker/Ashwesker-CVE-2025-68613 | POC详情 |
| 28 | None | https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613 | POC详情 |
| 29 | n8n RCE (CVE-2025-68613) - Proof of Concept | https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613 | POC详情 |
| 30 | Expression injection payloads for n8n CVE-2025-68613 RCE | https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads | POC详情 |
| 31 | Lab for CVE-2025-68613 n8n RCE | https://github.com/shibaaa204/CVE-2025-68613 | POC详情 |
| 32 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/n8n%20%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B2%99%E7%AE%B1%E9%80%83%E9%80%B8%E5%AF%BC%E8%87%B4%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-68613.md | POC详情 |
暂无评论