GHSA-wg4g-395p-mqv3
JavaScript Análise e mitigação de vulnerabilidades

Impact

When n8n-mcp runs in HTTP transport mode, authenticated MCP tools/call requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most notably n8n_manage_credentials.data — the raw values can be persisted in logs. In deployments where logs are collected, forwarded to external systems, or viewable outside the request trust boundary (shared log storage, SIEM pipelines, support/ops access), this can result in disclosure of:

  • bearer tokens and OAuth credentials sent through n8n_manage_credentials
  • per-tenant API keys and webhook auth headers embedded in tool arguments
  • arbitrary secret-bearing payloads passed to any MCP toolThe issue requires authentication (AUTH_TOKEN accepted by the server), so unauthenticated callers cannot trigger it; the runtime exposure is also reduced by an existing console-silencing layer in HTTP mode, but that layer is fragile and the values are still constructed and passed into the logger. The fix removes the leak at the source.Impact category: CWE-532 (Insertion of Sensitive Information into Log File). CVSS 3.1 score: 4.3 Medium (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

Affected

Deployments running n8n-mcp v2.47.12 or earlier in HTTP transport mode (MCP_MODE=http). The stdio transport short-circuits the relevant log calls and is not affected in practice.

Patched

v2.47.13 and later.

  • npm: npx n8n-mcp@latest (or pin to >= 2.47.13)
  • Docker: docker pull ghcr.io/czlonkowski/n8n-mcp:latestThe patch routes tool-call arguments through a metadata-only summarizer (summarizeToolCallArgs) that records type, top-level key names, and approximate size — never values. The same pattern was adopted earlier for HTTP request bodies in GHSA-pfm2-2mhg-8wpx.

Workarounds

If developers cannot upgrade immediately:

  • Restrict access to the HTTP port (firewall, reverse proxy, or VPN) so only trusted clients can authenticate.
  • Restrict access to server logs (no shared SIEM ingestion, no support read-only access) until the upgrade lands.
  • Switch to stdio transport (MCP_MODE=stdio, the default for CLI invocation), which has no HTTP surface and short-circuits the affected log calls.

Credit

n8n-MCP thanks @Mirr2 (Organization / Jormungandr) for reporting this issue.


OrigemNVD

Relacionado JavaScript Vulnerabilidades:

CVE ID

Gravidade

Pontuação

Tecnologias

Nome do componente

Exploração do CISA KEV

Tem correção

Data de publicação

CVE-2026-41478CRITICAL9.9
  • JavaScriptJavaScript
  • @saltcorn/server
NãoSimApr 24, 2026
CVE-2026-41501CRITICAL9.8
  • JavaScriptJavaScript
  • electerm
NãoSimApr 24, 2026
CVE-2026-41248CRITICAL9.1
  • JavaScriptJavaScript
  • @clerk/shared
NãoSimApr 24, 2026
GHSA-wg4g-395p-mqv3MEDIUM4.3
  • JavaScriptJavaScript
  • n8n-mcp
NãoSimApr 25, 2026
CVE-2026-42282MEDIUM4.3
  • JavaScriptJavaScript
  • n8n-mcp
NãoSimApr 25, 2026

Avaliação de vulnerabilidade gratuita

Compare sua postura de segurança na nuvem

Avalie suas práticas de segurança na nuvem em 9 domínios de segurança para comparar seu nível de risco e identificar lacunas em suas defesas.

Solicitar avaliação

Marque uma demonstração personalizada

Pronto para ver a Wiz em ação?

"A melhor experiência do usuário que eu já vi, fornece visibilidade total para cargas de trabalho na nuvem."
David EstlickCISO
"A Wiz fornece um único painel de vidro para ver o que está acontecendo em nossos ambientes de nuvem."
Adão FletcherDiretor de Segurança
"Sabemos que se a Wiz identifica algo como crítico, na verdade é."
Greg PoniatowskiChefe de Gerenciamento de Ameaças e Vulnerabilidades