{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreie6ju3t2comnaewsis2glcg7gumhvvbpbj3nro5ggxg7wgies7x5e",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mgtons5mdcs2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifg5gfao24arno6enikry222cuzey2e4uhp3uroddzx6sj35ksna4"
    },
    "mimeType": "image/jpeg",
    "size": 484956
  },
  "path": "/2026/03/cisa-flags-actively-exploited-n8n-rce.html",
  "publishedAt": "2026-03-12T05:18:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.\nThe vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched",
  "title": "CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed"
}