Home

Description

n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. From version 2.18.7 to before version 2.50.2, there is an authenticated server-side request forgery vulnerability affecting the webhook trigger tools, the n8n API client (N8N_API_URL), and per-request URLs supplied via the x-n8n-url header in multi-tenant HTTP mode. This issue has been patched in version 2.50.2.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




HIGH: 7.2CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L

Problem types

CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 2.18.7, < 2.50.2
affected

References

github.com/...8n-mcp/security/advisories/GHSA-cmrh-wvq6-wm9r

github.com/...ommit/bcaba839409d470abeb4a6ad9b361b553a1098eb

github.com/czlonkowski/n8n-mcp/releases/tag/v2.50.2

cve.org (CVE-2026-44694)

nvd.nist.gov (CVE-2026-44694)

Download JSON