GHSA-wg4g-395p-mqv3

GHSA-wg4g-395p-mqv3 MEDIUM
Published April 25, 2026

### Impact When `n8n-mcp` runs in HTTP transport mode, authenticated MCP `tools/call` requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most...

Full CISO analysis pending enrichment.

Affected Systems

Package Ecosystem Vulnerable Range Patched
n8n-mcp npm < 2.47.13 2.47.13
184.6K OpenSSF 6.0 Pushed 7d ago 27% patched ~1d to patch Full package profile →

Do you use n8n-mcp? You're affected.

Severity & Risk

CVSS 3.1
4.3 / 10
EPSS
N/A
Exploitation Status
No known exploitation
Sophistication
N/A

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Unchanged
C Low
I None
A None

Recommended Action

Patch available

Update n8n-mcp to version 2.47.13

Compliance Impact

Compliance analysis pending. Sign in for full compliance mapping when available.

Frequently Asked Questions

What is GHSA-wg4g-395p-mqv3?

n8n-MCP: Sensitive MCP tool-call arguments logged on authenticated requests in HTTP mode

Is GHSA-wg4g-395p-mqv3 actively exploited?

No confirmed active exploitation of GHSA-wg4g-395p-mqv3 has been reported, but organizations should still patch proactively.

How to fix GHSA-wg4g-395p-mqv3?

Update to patched version: n8n-mcp 2.47.13.

What is the CVSS score for GHSA-wg4g-395p-mqv3?

GHSA-wg4g-395p-mqv3 has a CVSS v3.1 base score of 4.3 (MEDIUM).

Technical Details

NVD Description

### Impact When `n8n-mcp` runs in HTTP transport mode, authenticated MCP `tools/call` requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most notably `n8n_manage_credentials.data` — the raw values can be persisted in logs. In deployments where logs are collected, forwarded to external systems, or viewable outside the request trust boundary (shared log storage, SIEM pipelines, support/ops access), this can result in disclosure of: - bearer tokens and OAuth credentials sent through `n8n_manage_credentials` - per-tenant API keys and webhook auth headers embedded in tool arguments - arbitrary secret-bearing payloads passed to any MCP tool The issue requires authentication (`AUTH_TOKEN` accepted by the server), so unauthenticated callers cannot trigger it; the runtime exposure is also reduced by an existing console-silencing layer in HTTP mode, but that layer is fragile and the values are still constructed and passed into the logger. The fix removes the leak at the source. Impact category: **CWE-532** (Insertion of Sensitive Information into Log File). CVSS 3.1 score: **4.3 Medium** (`AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`). ### Affected Deployments running n8n-mcp **v2.47.12 or earlier** in HTTP transport mode (`MCP_MODE=http`). The stdio transport short-circuits the relevant log calls and is not affected in practice. ### Patched **v2.47.13** and later. - npm: `npx n8n-mcp@latest` (or pin to `>= 2.47.13`) - Docker: `docker pull ghcr.io/czlonkowski/n8n-mcp:latest` The patch routes tool-call arguments through a metadata-only summarizer (`summarizeToolCallArgs`) that records type, top-level key names, and approximate size — never values. The same pattern was adopted earlier for HTTP request bodies in GHSA-pfm2-2mhg-8wpx. ### Workarounds If developers cannot upgrade immediately: - Restrict access to the HTTP port (firewall, reverse proxy, or VPN) so only trusted clients can authenticate. - Restrict access to server logs (no shared SIEM ingestion, no support read-only access) until the upgrade lands. - Switch to stdio transport (`MCP_MODE=stdio`, the default for CLI invocation), which has no HTTP surface and short-circuits the affected log calls. ### Credit n8n-MCP thanks [@Mirr2](https://github.com/Mirr2) (Organization / Jormungandr) for reporting this issue.

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Timeline

Published
April 25, 2026
Last Modified
April 25, 2026
First Seen
April 26, 2026

Related Vulnerabilities