In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.
Start learningUpgrade n8n-mcp to version 2.47.13 or higher.
n8n-mcp is an Integration between n8n workflow automation and Model Context Protocol (MCP)
Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File via the request dispatcher and related logging. An attacker can obtain sensitive information, such as credentials or API keys, by accessing improperly redacted server logs.
Note: This is only exploitable if the application is running in HTTP transport mode and logs are accessible outside the trusted boundary.
This vulnerability can be mitigated by restricting access to the HTTP port to trusted clients, limiting access to server logs, or switching to stdio transport mode.