CVE-2026-44694 PUBLISHED

n8n-MCP: Authenticated SSRF in n8n-mcp webhook and API client paths

Assigner: GitHub_M
Reserved: 07.05.2026 Published: 08.05.2026 Updated: 08.05.2026

n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. From version 2.18.7 to before version 2.50.2, there is an authenticated server-side request forgery vulnerability affecting the webhook trigger tools, the n8n API client (N8N_API_URL), and per-request URLs supplied via the x-n8n-url header in multi-tenant HTTP mode. This issue has been patched in version 2.50.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
CVSS Score: 7.2

Product Status

Vendor czlonkowski
Product n8n-mcp
Versions
  • Version >= 2.18.7, < 2.50.2 is affected

References

Problem Types

  • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE
  • CWE-918: Server-Side Request Forgery (SSRF) CWE