Impact
The n8n-MCP server logs request metadata from POST /mcp requests regardless of authentication outcome, so bearer tokens, per-tenant API keys, and JSON-RPC payloads from rejected requests are recorded in server logs. This exposure of credentials and request data could lead to disclosure to anyone who can view the logs, including external SIEM systems, shared storage, or operators with access.
Affected Systems
The vulnerability affects the n8n-MCP server developed by czlonkowski. Versions prior to 2.47.11 running in HTTP transport mode are impacted; the issue was fixed in release 2.47.11.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk, and the lack of available EPSS data suggests no currently known widespread exploitation. The vulnerability is not listed in CISA KEV. Attackers can exploit it by sending unauthenticated POST requests to /mcp; the server logs the request metadata before rejecting the call, so sensitive headers and payloads are written to logs. Since access control itself is not bypassed, the primary threat is accidental disclosure of credentials to anyone with log access.
OpenCVE Enrichment
Github GHSA