Insertion of Sensitive Information into Log File Affecting n8n-mcp package, versions <2.47.13


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NMCP-16318350
  • published28 Apr 2026
  • disclosed25 Apr 2026
  • creditMirr2

Introduced: 25 Apr 2026

NewCVE-2026-42282  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade n8n-mcp to version 2.47.13 or higher.

Overview

n8n-mcp is an Integration between n8n workflow automation and Model Context Protocol (MCP)

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File via the request dispatcher and related logging. An attacker can obtain sensitive information, such as credentials or API keys, by accessing improperly redacted server logs.

Note: This is only exploitable if the application is running in HTTP transport mode and logs are accessible outside the trusted boundary.

Workaround

This vulnerability can be mitigated by restricting access to the HTTP port to trusted clients, limiting access to server logs, or switching to stdio transport mode.

CVSS Base Scores

version 4.0
version 3.1