Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. n8n-mcp
  4. ›
  5. CVE-2026-41495

CVE-2026-41495: n8n-MCP Logs Sensitive Request Data on Unauthorized /mcp Requests

April 23, 2026

When n8n-mcp runs in HTTP transport mode, incoming requests to the POST /mcp endpoint had their request metadata written to server logs regardless of the authentication outcome. In deployments where logs are collected, forwarded to external systems, or viewable outside the request trust boundary (shared log storage, SIEM pipelines, support/ops access), this can result in disclosure of:

  • bearer tokens from the Authorization header
  • per-tenant API keys from the x-n8n-key header in multi-tenant setups
  • JSON-RPC request payloads sent to the MCP endpoint

Access control itself was not bypassed — unauthenticated requests were correctly rejected with 401 Unauthorized — but sensitive values from those rejected requests could still be persisted in logs.

Impact category: CWE-532 (Insertion of Sensitive Information into Log File).

References

  • github.com/advisories/GHSA-pfm2-2mhg-8wpx
  • github.com/czlonkowski/n8n-mcp
  • github.com/czlonkowski/n8n-mcp/security/advisories/GHSA-pfm2-2mhg-8wpx
  • nvd.nist.gov/vuln/detail/CVE-2026-41495

Code Behaviors & Features

Detect and mitigate CVE-2026-41495 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.47.11

Fixed versions

  • 2.47.11

Solution

Upgrade to version 2.47.11 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

npm/n8n-mcp/CVE-2026-41495.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:31 +0000.