Posts

Showing posts with the label forensics

n8n – CVE-2025-68613: Critical RCE Vulnerability

Image
    A critical vulnerability ( CVE-2025-68613 ) has been identified in n8n , the popular workflow automation tool. The flaw lies in the expression evaluation system, where user-supplied expressions can escape the sandbox and access Node.js internals. This leads to arbitrary code execution with a CVSS score of 9.9 (Critical) .      n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance,...

File Doppelgängers: The World of Polyglot Files

Image
Unlocking the Secrets of Polyglot Files: When One File Speaks Many Languages Introduction In the world of cybersecurity, appearances can be deceiving. A file might look like an innocent image, but behind the scenes, it could also be a ZIP archive, a PDF, or even an executable. Such files are called polyglots — single files that are valid under multiple file formats at the same time. Polyglots are fascinating from a technical standpoint, but they also pose serious security risks. Attackers often use them to bypass filters, sneak past antivirus solutions, or trick unsuspecting users into executing malicious code. What Are Polyglot Files? A polyglot file is crafted in such a way that it conforms to the specifications of two (or more) different file types simultaneously. Example: A file that is both a JPEG image and a ZIP archive . When opened in an image viewer → You see a normal picture. When extracted with a ZIP tool → You find hidden file...