n8n-mcp Authenticated SSRF Vulnerability
An authenticated server-side request forgery (SSRF) vulnerability affects the webhook trigger tools and the n8n API client in n8n-mcp versions 2.18.7 to before 2.50.2, allowing attackers to make HTTP requests from the n8n-mcp host to internal services and cloud metadata endpoints, potentially leading to credential theft and internal service enumeration.
n8n-mcp versions 2.18.7 before 2.50.2 contain an authenticated Server-Side Request Forgery (SSRF) vulnerability. This flaw resides within the webhook trigger tools, the n8n API client (N8N_API_URL), and per-request URLs supplied via the x-n8n-url header in multi-tenant HTTP mode. A successful exploit allows a caller with access to the MCP session to trigger HTTP requests originating from the n8n-mcp host, targeting internal services and cloud metadata endpoints. The vulnerability impacts multi-tenant HTTP deployments where tenants share an AUTH_TOKEN, single-tenant deployments via indirect prompt injection through tool arguments, and stdio deployments reachable via the same prompt-injection path.
Attack Chain
- An attacker gains access to the n8n-mcp instance with valid authentication credentials. This could be through compromised credentials or other vulnerabilities.
- The attacker crafts a malicious HTTP request targeting a webhook trigger tool or the n8n API client.
- The attacker injects a URL pointing to an internal service or a cloud metadata endpoint (e.g.,
169.254.169.254) through a tool argument or thex-n8n-urlheader. - The n8n-mcp instance, due to the SSRF vulnerability, makes an HTTP request to the attacker-specified internal URL.
- The internal service responds to the n8n-mcp instance.
- The n8n-mcp instance forwards the response body back to the attacker, allowing them to enumerate internal services or steal credentials.
- The attacker extracts sensitive information, such as cloud metadata, API keys, or internal service configuration.
- The attacker uses the acquired credentials to further compromise the internal network or cloud environment.
Impact
Successful exploitation of this SSRF vulnerability can lead to significant damage. In multi-tenant environments, a single compromised tenant can exfiltrate temporary IAM / GCP service account / Azure managed-identity credentials. This allows the attacker to gain unauthorized access to cloud resources and potentially compromise other tenants. In single-tenant and stdio deployments, attackers can leverage prompt injection to achieve similar results. The vulnerability enables internal service enumeration and credential theft, potentially leading to lateral movement and data breaches.
Recommendation
- Upgrade to
n8n-mcp@2.50.2or later to patch CVE-2026-44694 and mitigate the SSRF vulnerability. - Implement network egress restrictions on the n8n-mcp host to prevent unauthorized access to cloud metadata IPs (
169.254.169.254,169.254.170.2,100.100.100.200,192.0.0.192) and RFC1918 networks, as described in the workaround section. - If immediate upgrade is not possible, disable workflow management tools (
n8n_trigger_webhook_workflow,n8n_create_workflow,n8n_test_workflow) viaDISABLED_TOOLSconfiguration to limit the attack surface.
Detection coverage 2
Detect CVE-2026-44694 Exploitation Attempt - Cloud Metadata Request
highDetects CVE-2026-44694 exploitation attempt — Outbound HTTP request from n8n-mcp host to known cloud metadata IP addresses indicating potential SSRF exploit
Detect CVE-2026-44694 Exploitation Attempt - x-n8n-url Header Usage
mediumDetects CVE-2026-44694 exploitation attempt — Usage of the x-n8n-url header with suspicious URL patterns, potentially indicating SSRF exploit.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
4
ip
| Type | Value |
|---|---|
| ip | 169.254.169.254 |
| ip | 169.254.170.2 |
| ip | 100.100.100.200 |
| ip | 192.0.0.192 |