Description
n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. From version 2.18.7 to before version 2.50.2, there is an authenticated server-side request forgery vulnerability affecting the webhook trigger tools, the n8n API client (N8N_API_URL), and per-request URLs supplied via the x-n8n-url header in multi-tenant HTTP mode. This issue has been patched in version 2.50.2.
Problem types
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-918: Server-Side Request Forgery (SSRF)
Product status
References
github.com/...8n-mcp/security/advisories/GHSA-cmrh-wvq6-wm9r
github.com/...ommit/bcaba839409d470abeb4a6ad9b361b553a1098eb
github.com/czlonkowski/n8n-mcp/releases/tag/v2.50.2