### Impact When `n8n-mcp` runs in HTTP transport mode, authenticated MCP `tools/call` requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most...
Full CISO analysis pending enrichment.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n-mcp | npm | < 2.47.13 | 2.47.13 |
Do you use n8n-mcp? You're affected.
Severity & Risk
Attack Surface
Recommended Action
Patch available
Update n8n-mcp to version 2.47.13
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Frequently Asked Questions
What is GHSA-wg4g-395p-mqv3?
n8n-MCP: Sensitive MCP tool-call arguments logged on authenticated requests in HTTP mode
Is GHSA-wg4g-395p-mqv3 actively exploited?
No confirmed active exploitation of GHSA-wg4g-395p-mqv3 has been reported, but organizations should still patch proactively.
How to fix GHSA-wg4g-395p-mqv3?
Update to patched version: n8n-mcp 2.47.13.
What is the CVSS score for GHSA-wg4g-395p-mqv3?
GHSA-wg4g-395p-mqv3 has a CVSS v3.1 base score of 4.3 (MEDIUM).
Technical Details
NVD Description
### Impact When `n8n-mcp` runs in HTTP transport mode, authenticated MCP `tools/call` requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most notably `n8n_manage_credentials.data` — the raw values can be persisted in logs. In deployments where logs are collected, forwarded to external systems, or viewable outside the request trust boundary (shared log storage, SIEM pipelines, support/ops access), this can result in disclosure of: - bearer tokens and OAuth credentials sent through `n8n_manage_credentials` - per-tenant API keys and webhook auth headers embedded in tool arguments - arbitrary secret-bearing payloads passed to any MCP tool The issue requires authentication (`AUTH_TOKEN` accepted by the server), so unauthenticated callers cannot trigger it; the runtime exposure is also reduced by an existing console-silencing layer in HTTP mode, but that layer is fragile and the values are still constructed and passed into the logger. The fix removes the leak at the source. Impact category: **CWE-532** (Insertion of Sensitive Information into Log File). CVSS 3.1 score: **4.3 Medium** (`AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`). ### Affected Deployments running n8n-mcp **v2.47.12 or earlier** in HTTP transport mode (`MCP_MODE=http`). The stdio transport short-circuits the relevant log calls and is not affected in practice. ### Patched **v2.47.13** and later. - npm: `npx n8n-mcp@latest` (or pin to `>= 2.47.13`) - Docker: `docker pull ghcr.io/czlonkowski/n8n-mcp:latest` The patch routes tool-call arguments through a metadata-only summarizer (`summarizeToolCallArgs`) that records type, top-level key names, and approximate size — never values. The same pattern was adopted earlier for HTTP request bodies in GHSA-pfm2-2mhg-8wpx. ### Workarounds If developers cannot upgrade immediately: - Restrict access to the HTTP port (firewall, reverse proxy, or VPN) so only trusted clients can authenticate. - Restrict access to server logs (no shared SIEM ingestion, no support read-only access) until the upgrade lands. - Switch to stdio transport (`MCP_MODE=stdio`, the default for CLI invocation), which has no HTTP surface and short-circuits the affected log calls. ### Credit n8n-MCP thanks [@Mirr2](https://github.com/Mirr2) (Organization / Jormungandr) for reporting this issue.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27495 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n
AI Threat Alert