In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.
Start learningUpgrade n8n-mcp to version 2.47.11 or higher.
n8n-mcp is an Integration between n8n workflow automation and Model Context Protocol (MCP)
Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the POST /mcp endpoint. An attacker can cause sensitive information such as bearer tokens, API keys, and request payloads to be written to server logs by sending unauthorized requests.
Note: This is only exploitable if the application is running in HTTP transport mode and logs are accessible outside the trusted boundary.
This vulnerability can be mitigated by restricting network access to the HTTP port so only trusted clients can reach the endpoint, or by switching to stdio transport mode.