GHSA-WG4G-395P-MQV3: Cleartext Logging of Sensitive Tool-Call Arguments in n8n-mcp
Vulnerability ID: GHSA-WG4G-395P-MQV3
CVSS Score: 5.3
Published: 2026-04-25
The n8n-mcp npm package prior to version 2.47.3 contains an information disclosure vulnerability when operating in HTTP mode. The server explicitly logs incoming JSON-RPC request bodies, which exposes sensitive tool-call arguments, including API keys and internal data, to application logs in cleartext.
TL;DR
n8n-mcp logs sensitive tool-call arguments in cleartext when running in HTTP mode. Update to version 2.47.3 to remove the vulnerable logging configuration.
Technical Details
- Vulnerability Type: CWE-532: Insertion of Sensitive Information into Log File
- Attack Vector: Local / Log Access
- Impact: High Confidentiality Loss
- Exploit Status: Passive Information Disclosure
- CVSS Score: 5.3 (Moderate)
- Affected Component: n8n-mcp < 2.47.3
Affected Systems
- n8n-mcp npm package
- Model Context Protocol (MCP) server implementations
- Log aggregation and monitoring infrastructure
-
n8n-mcp: < 2.47.3 (Fixed in:
2.47.3)
Code Analysis
Commit: 643c98b
Remove params from logger call in handleRequest method to prevent sensitive data disclosure.
Mitigation Strategies
- Software Update
- Log Sanitization
- Credential Rotation
Remediation Steps:
- Identify all projects and environments utilizing the n8n-mcp package.
- Update the n8n-mcp package dependency to version 2.47.3 or later via npm.
- Scan existing application logs, container standard output, and centralized logging platforms for the 'handleRequest: Processing MCP request' string.
- Rotate any API keys, credentials, or sensitive tokens that are discovered within the historical log output.
- Purge the affected historical logs from the centralized logging infrastructure.
References
- GHSA-wg4g-395p-mqv3: Sensitive MCP tool-call arguments logged on authenticated requests in HTTP mode
- n8n-mcp Fix Commit
- n8n-mcp Package Repository
Read the full report for GHSA-WG4G-395P-MQV3 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)