{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreie6ju3t2comnaewsis2glcg7gumhvvbpbj3nro5ggxg7wgies7x5e",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mgtons5mdcs2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifg5gfao24arno6enikry222cuzey2e4uhp3uroddzx6sj35ksna4"
},
"mimeType": "image/jpeg",
"size": 484956
},
"path": "/2026/03/cisa-flags-actively-exploited-n8n-rce.html",
"publishedAt": "2026-03-12T05:18:00.000Z",
"site": "https://thehackernews.com",
"textContent": "The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.\nThe vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched",
"title": "CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed"
}