Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Detection for CVE-2025-68613 | https://github.com/rxerium/CVE-2025-68613 | POC Details |
| 2 | CVE-2025-68613 | https://github.com/Ashwesker/Blackash-CVE-2025-68613 | POC Details |
| 3 | Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance. | https://github.com/TheStingR/CVE-2025-68613-POC | POC Details |
| 4 | CVE-2025-68613: n8n RCE vulnerability exploit and documentation | https://github.com/wioui/n8n-CVE-2025-68613-exploit | POC Details |
| 5 | 通过GitHub Copilot 辅助分析CVE-2025-68613漏洞 | https://github.com/intbjw/CVE-2025-68613-poc-via-copilot | POC Details |
| 6 | None | https://github.com/ali-py3/Exploit-CVE-2025-68613 | POC Details |
| 7 | This repository contains a laboratory-grade analysis and a **safe Proof-of-Concept** for the vulnerability **CVE-2025-68613**, affecting the workflow automation platform **n8n**. | https://github.com/nehkark/CVE-2025-68613 | POC Details |
| 8 | My poc to exploit this vuln :D | https://github.com/GnuTLam/POC-CVE-2025-68613 | POC Details |
| 9 | n8n < 1.120.4, 1.121.1, 1.122.0 contains a remote code execution caused by insufficient isolation in workflow expression evaluation, letting authenticated attackers execute arbitrary code with n8n process privileges. Exploit requires authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-68613.yaml | POC Details |
| 10 | 基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE) | https://github.com/secjoker/CVE-2025-68613 | POC Details |
| 11 | Analysis of CVE-2025-68613 | https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab | POC Details |
| 12 | None | https://github.com/intelligent-ears/CVE-2025-68613 | POC Details |
| 13 | GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0) | https://github.com/manyaigdtuw/CVE-2025-68613_Scanner | POC Details |
| 14 | Remote Code Execution via n8n Workflows (Based on CVE-2025-68613) | https://github.com/AbdulRKB/n8n-RCE | POC Details |
| 15 | Python Exploit for CVE-2025-68613. | https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit | POC Details |
| 16 | n8n God Mode Ultimate - CVE-2025-68613 Scanner v1.0.0 ║ ║ Workflow Automation Remote Code Execution | https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate | POC Details |
| 17 | Proof-of-Concept exploit for CVE-2025-68613: Authenticated Remote Code Execution in n8n via Expression Injection | https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613 | POC Details |
| 18 | Technical study of the CVE-2025-68613 vulnerability in n8n, covering affected versions, laboratory exploration scenario, offensive and defensive analysis, and mitigation strategies. | https://github.com/releaseown/Analysis-n8n-CVE-2025-68613 | POC Details |
| 19 | None | https://github.com/Dlanang/homelab-CVE-2025-68613 | POC Details |
| 20 | None | https://github.com/Khin-96/n8n-cve-2025-68613-thm | POC Details |
| 21 | The minor methodology for room: https://tryhackme.com/room/n8ncve202568613 | https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe | POC Details |
| 22 | CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips) | https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis | POC Details |
| 23 | This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance. | https://github.com/LingerANR/n8n-CVE-2025-68613 | POC Details |
| 24 | POC for CVE-2025-68613 | https://github.com/reem-012/poc_CVE-2025-68613 | POC Details |
| 25 | Technical study of the CVE-2025-68613 vulnerability in n8n, covering affected versions, laboratory exploration scenario, offensive and defensive analysis, and mitigation strategies. | https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613 | POC Details |
| 26 | n8n CVE-2025-68613 | https://github.com/gagaltotal/n8n-cve-2025-68613 | POC Details |
| 27 | CVE-2025-68613 | https://github.com/Ashwesker/Ashwesker-CVE-2025-68613 | POC Details |
| 28 | None | https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613 | POC Details |
| 29 | n8n RCE (CVE-2025-68613) - Proof of Concept | https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613 | POC Details |
| 30 | Expression injection payloads for n8n CVE-2025-68613 RCE | https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads | POC Details |
| 31 | Lab for CVE-2025-68613 n8n RCE | https://github.com/shibaaa204/CVE-2025-68613 | POC Details |
| 32 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/n8n%20%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B2%99%E7%AE%B1%E9%80%83%E9%80%B8%E5%AF%BC%E8%87%B4%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-68613.md | POC Details |
| 33 | CVE-2025-68613 | https://github.com/sahilccras/Blackash-CVE-2025-68613 | POC Details |
| 34 | None | https://github.com/Rishi-kaul/n8n-CVE-2025-68613 | POC Details |
| 35 | Relatório TryHackMe — n8n CVE-2025-68613 (CVSS 9.9) | https://github.com/Victorhugofariasvieir66/relatorio-n8n.md | POC Details |
| 36 | https://github.com/vulhub/vulhub/blob/master/n8n/CVE-2025-68613/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet