CVE-2026-45707 is a tenant isolation failure in n8n-mcp's HTTP transport: any authenticated MCP tenant can silently pivot to the operator's own n8n instance simply by omitting the x-n8n-url or x-n8n-key request headers, causing all n8n management calls to execute under the operator's high-privilege API key. With a CVSS of 8.1 (High) and no privilege escalation required beyond a valid tenant session, exploitation is trivial for anyone with a legitimate account on a shared n8n-mcp deployment. The blast radius spans full workflow read/write, credential vault metadata, execution history, and data table contents — and escalates to OS-level RCE if the operator's n8n instance permits Code-node execution. Upgrade immediately to n8n-mcp 2.51.2 or, if patching is blocked, disable ENABLE_MULTI_TENANT and deploy isolated per-tenant instances.
What is the risk?
High severity (CVSS 8.1, C:H/I:H). Exploitation requires only a valid tenant credential — no special knowledge, no privilege escalation — making this trivially accessible to any user of a shared n8n-mcp service. Community Edition n8n API keys are unscoped by default, meaning the operator's N8N_API_KEY carries full instance access wholesale. The absence of a public exploit or scanner template provides limited relief given how mechanically simple the attack is (omit two HTTP headers). The potential RCE path via Code-node execution elevates this beyond a data-access event to full operator environment compromise. OpenSSF Scorecard for n8n-mcp is 6.1/10 and 83 prior CVEs exist in the package, suggesting a pattern of security debt.
Attack Kill Chain
What systems are affected?
Severity & Risk
Attack Surface
What should I do?
5 steps-
Patch immediately: upgrade n8n-mcp to 2.51.2 via
npx n8n-mcp@latestordocker pull ghcr.io/czlonkowski/n8n-mcp:latest. -
If immediate patching is blocked, set ENABLE_MULTI_TENANT=false and run a separate n8n-mcp instance per tenant with that tenant's own credentials — this removes the vulnerable code path entirely.
-
Proxy-level partial mitigation: reject requests missing both x-n8n-url and x-n8n-key headers with HTTP 400; note this only addresses the primary path, not secondary response-shape disclosures.
-
Scope operator API keys: if using n8n Enterprise or a build with API key scoping, provision the operator's N8N_API_KEY with minimum required scopes to limit blast radius should fallback occur.
-
Audit: review n8n execution logs for unexpected workflow triggers, credential reads, or data access patterns originating from tenant sessions prior to patching.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-45707?
CVE-2026-45707 is a tenant isolation failure in n8n-mcp's HTTP transport: any authenticated MCP tenant can silently pivot to the operator's own n8n instance simply by omitting the x-n8n-url or x-n8n-key request headers, causing all n8n management calls to execute under the operator's high-privilege API key. With a CVSS of 8.1 (High) and no privilege escalation required beyond a valid tenant session, exploitation is trivial for anyone with a legitimate account on a shared n8n-mcp deployment. The blast radius spans full workflow read/write, credential vault metadata, execution history, and data table contents — and escalates to OS-level RCE if the operator's n8n instance permits Code-node execution. Upgrade immediately to n8n-mcp 2.51.2 or, if patching is blocked, disable ENABLE_MULTI_TENANT and deploy isolated per-tenant instances.
Is CVE-2026-45707 actively exploited?
No confirmed active exploitation of CVE-2026-45707 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-45707?
1. Patch immediately: upgrade n8n-mcp to 2.51.2 via `npx n8n-mcp@latest` or `docker pull ghcr.io/czlonkowski/n8n-mcp:latest`. 2. If immediate patching is blocked, set ENABLE_MULTI_TENANT=false and run a separate n8n-mcp instance per tenant with that tenant's own credentials — this removes the vulnerable code path entirely. 3. Proxy-level partial mitigation: reject requests missing both x-n8n-url and x-n8n-key headers with HTTP 400; note this only addresses the primary path, not secondary response-shape disclosures. 4. Scope operator API keys: if using n8n Enterprise or a build with API key scoping, provision the operator's N8N_API_KEY with minimum required scopes to limit blast radius should fallback occur. 5. Audit: review n8n execution logs for unexpected workflow triggers, credential reads, or data access patterns originating from tenant sessions prior to patching.
What systems are affected by CVE-2026-45707?
This vulnerability affects the following AI/ML architecture patterns: AI agent orchestration, Multi-tenant MCP services, Workflow automation platforms, LLM integration pipelines.
What is the CVSS score for CVE-2026-45707?
CVE-2026-45707 has a CVSS v3.1 base score of 8.1 (HIGH).
Technical Details
NVD Description
## Summary When `ENABLE_MULTI_TENANT=true`, the HTTP transport documents that the target n8n instance is selected per-request from `x-n8n-url` / `x-n8n-key` headers. Requests that omitted those headers — or supplied only one of them — silently fell back to the process-level `N8N_API_URL` / `N8N_API_KEY` credentials configured for the operator's own n8n instance. As a result, an authenticated MCP tenant could cause n8n management calls to execute against the operator's instance instead of its own. This affects HTTP-mode deployments of `n8n-mcp` that are run as a shared multi-tenant service. Single-tenant deployments (`ENABLE_MULTI_TENANT` unset or `false`) are not affected. ## Impact An authenticated MCP tenant exploiting this path could read and write workflows, executions, data-table contents, and credential metadata on the operator's n8n instance. If the operator's n8n permits Code-node execution that reaches OS-level modules, the path could escalate to remote code execution inside the operator's n8n runtime. The process-level `N8N_API_KEY` is, in practice, a high-privilege key — Community Edition keys are unscoped by default, and even Enterprise scopes were configured for the operator's own needs and would carry over wholesale to a tenant who triggered the fallback. ## Patches Fixed in **n8n-mcp 2.51.2**. The fix: - Rejects header-less multi-tenant requests at the HTTP edge with HTTP 400 / JSON-RPC `-32602` before any handler runs. - Refuses to construct an env-credential n8n API client when `ENABLE_MULTI_TENANT=true`. - Closes secondary leak paths in trigger handlers and in the responses of `n8n_health_check`, `n8n_diagnostic`, `n8n_deploy_template`, and `n8n_audit_instance` so the operator's URL and env-key indicator are not surfaced to tenants. Single-tenant behavior is unchanged. ## Upgrade ```bash # NPM npx n8n-mcp@latest # Docker docker pull ghcr.io/czlonkowski/n8n-mcp:latest ``` ## Workarounds If an immediate upgrade is not possible, any one of the following reduces or eliminates exposure: - **Disable multi-tenant mode.** Set `ENABLE_MULTI_TENANT=false` (or unset it) and run a separate n8n-mcp instance per tenant with that tenant's own `N8N_API_URL` / `N8N_API_KEY`. This removes the affected code path entirely. - **Reject malformed requests at a proxy.** Require both `x-n8n-url` and `x-n8n-key` headers on every request and return 400 if either is missing. Neutralizes the primary header-omission path but does not address the secondary response-shape disclosures, so this is a partial mitigation only. - **Reduce the blast radius of the operator API key.** If your n8n instance supports API key scoping (Enterprise, or a Community Edition build that exposes scopes), provision the operator's `N8N_API_KEY` with the minimum scopes required for the operator's own n8n-mcp functions. This does not close the boundary break but limits what a falling-back tenant can do. ## Credit Reported by [@u-ktdi](https://github.com/u-ktdi).
Exploitation Scenario
An adversary registers as a legitimate tenant on a shared n8n-mcp HTTP service (ENABLE_MULTI_TENANT=true). They craft MCP HTTP requests deliberately omitting the x-n8n-url and x-n8n-key headers. The unpatched server receives header-incomplete requests and silently falls back to the operator's process-level N8N_API_URL and N8N_API_KEY. All subsequent n8n management calls execute against the operator's n8n instance — the adversary enumerates all workflows, reads stored credential metadata (LLM API keys, SaaS OAuth tokens, database passwords), and exfiltrates execution history. If Code-node execution is enabled with OS-level module access, the adversary deploys a malicious workflow containing a Node.js Code node that spawns a reverse shell, achieving persistent RCE in the operator's environment with no additional steps.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n