Overview
Description
Statistics
- 10 Posts
- 34 Interactions
Fediverse
this was some great and necessary debunking of the ridiculous attempt at a "look how cool we are” CVE assignment.
between this and the "it's actually not a real vuln from an internet-perspective" for the recent daft D-Link CVE assignment, the cyber part of 2026 is off to a really horrible start.
https://horizon3.ai/attack-research/attack-blogs/the-ni8mare-test-n8n-rce-under-the-microscope-cve-2026-21858/
A good reminder to secure your n8n hosts, and not to open up things to the internet if you don't absolutely have to.
#security
https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
🚨 Kritische Schwachstellen in n8n
In den letzten drei Wochen wurden vier kritische Schwachstellen (CVE-2025-68613, CVE-2025-68668, CVE-2026-21858, CVE-2026-21877) in der Open-Source Workflow-Automatisierungsplattform n8n gemeldet, die von Angreifenden ausgenutzt werden können, um beliebigen Programmcode auszuführen und die Systeme ggf. vollständig zu kompromittieren.
Betroffene Systeme sollten zeitnah auf eine aktuelle Version gebracht werden.
Nutzt wer die "Automatisierungs-Plattform" n8n? Die ist sicherheitstechnisch löchrig wie ein Schweizer Käse. Liste des CVE-Grauens (Base Score bis 10.0) der letzten Tage. #n8mare
Details zu den einzelnen Schwachstellen:
CVE-2025-68613 (betrifft Versionen vor 1.20.4)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
CVE-2025-68668 (betrifft Versionen vor 2.0.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v
CVE-2026-21858 (betrifft Versionen vor 1.121.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
CVE-2026-21877 (betrifft Versionen vor 1.121.3)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Bluesky
Overview
Description
Statistics
- 6 Posts
- 22 Interactions
Fediverse
Uh... how is https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263 (CVE-2026-21877) a 10.0 with PR:L? That is not possible, either it's a 9.9 or it has PR:N.
n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.
Read: https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/
🚨 Kritische Schwachstellen in n8n
In den letzten drei Wochen wurden vier kritische Schwachstellen (CVE-2025-68613, CVE-2025-68668, CVE-2026-21858, CVE-2026-21877) in der Open-Source Workflow-Automatisierungsplattform n8n gemeldet, die von Angreifenden ausgenutzt werden können, um beliebigen Programmcode auszuführen und die Systeme ggf. vollständig zu kompromittieren.
Betroffene Systeme sollten zeitnah auf eine aktuelle Version gebracht werden.
Nutzt wer die "Automatisierungs-Plattform" n8n? Die ist sicherheitstechnisch löchrig wie ein Schweizer Käse. Liste des CVE-Grauens (Base Score bis 10.0) der letzten Tage. #n8mare
Details zu den einzelnen Schwachstellen:
CVE-2025-68613 (betrifft Versionen vor 1.20.4)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
CVE-2025-68668 (betrifft Versionen vor 2.0.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v
CVE-2026-21858 (betrifft Versionen vor 1.121.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
CVE-2026-21877 (betrifft Versionen vor 1.121.3)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Overview
- Trend Micro, Inc.
- Trend Micro Apex Central
Description
Statistics
- 4 Posts
Fediverse
PoC exploits are now public for CVE-2025-69258 in Trend Micro Apex Central (on-premise), a vulnerability that could allow unauthenticated RCE on affected systems.
A patch is available, and there are no confirmed exploitation reports so far. Public PoCs, however, tend to accelerate attacker interest.
Follow @technadu for objective and technically grounded infosec updates.
Source: https://www.helpnetsecurity.com/2026/01/08/trend-micro-apex-central-cve-2025-69258-rce-poc/
#Infosec #VulnerabilityDisclosure #PatchManagement #RCE #EnterpriseSecurity #ThreatLandscape
Bluesky
Overview
- Cisco
- Cisco Identity Services Engine Software
Description
Statistics
- 3 Posts
Bluesky
Overview
- SmarterTools
- SmarterMail
Description
Statistics
- 4 Posts
- 19 Interactions
Fediverse
Overview
Description
Statistics
- 3 Posts
Bluesky
Overview
- Veeam
- Backup and Recovery
Description
Statistics
- 3 Posts
- 3 Interactions
Fediverse
🔴 CVE-2025-59470 - Critical (9)
This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
Description
Statistics
- 1 Post
- 20 Interactions
Overview
Description
Statistics
- 2 Posts
- 4 Interactions
Fediverse
🟠 CVE-2025-65518 - High (7.5)
Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web inter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65518/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
DoS in Technitium DNS server.
https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-50334
🟠 CVE-2025-50334 - High (7.5)
An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-50334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda