Insertion of Sensitive Information into Log File Affecting n8n-mcp package, versions <2.47.11


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NMCP-16318348
  • published28 Apr 2026
  • disclosed23 Apr 2026
  • creditS4nso

Introduced: 23 Apr 2026

NewCVE-2026-41495  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade n8n-mcp to version 2.47.11 or higher.

Overview

n8n-mcp is an Integration between n8n workflow automation and Model Context Protocol (MCP)

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the POST /mcp endpoint. An attacker can cause sensitive information such as bearer tokens, API keys, and request payloads to be written to server logs by sending unauthorized requests.

Note: This is only exploitable if the application is running in HTTP transport mode and logs are accessible outside the trusted boundary.

Workaround

This vulnerability can be mitigated by restricting network access to the HTTP port so only trusted clients can reach the endpoint, or by switching to stdio transport mode.

CVSS Base Scores

version 4.0
version 3.1