<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>N8n-Mcp (&lt; 2.50.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/n8n-mcp--2.50.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 17:00:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/n8n-mcp--2.50.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n-mcp Vulnerable to Path Traversal, SSRF, and Telemetry Exposure</title><link>https://feed.craftedsignal.io/briefs/2024-01-16-n8n-mcp-vulns/</link><pubDate>Fri, 08 May 2026 17:00:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-16-n8n-mcp-vulns/</guid><description>n8n-mcp versions before 2.50.1 are vulnerable to path traversal, redirect-following SSRF, and telemetry payload exposure, potentially leading to sensitive information disclosure and unauthorized access.</description><content:encoded><![CDATA[<p><code>n8n-mcp</code> versions prior to 2.50.1 are susceptible to three distinct vulnerabilities affecting deployments that leverage the n8n API integration. The first issue involves a lack of validation for caller-supplied identifiers used as URL path segments, enabling authenticated MCP callers to manipulate workflow IDs and direct outbound requests with the configured n8n API key to unintended same-origin endpoints, effectively bypassing access controls. The second vulnerability arises from validated webhook, form, and chat trigger URLs following redirects, potentially redirecting outbound requests to untrusted hosts and exposing the response body to the caller as a non-blind SSRF. Finally, the default opt-in telemetry feature stores unredacted operation payloads, which may contain sensitive information like bearer tokens, API keys, and webhook secrets from workflow node parameters. Successful exploitation of these vulnerabilities could lead to sensitive data exposure and unauthorized access to internal resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to the n8n-mcp instance.</li>
<li>The attacker crafts a malicious workflow ID containing path traversal characters.</li>
<li>The attacker makes an MCP call using the crafted workflow ID.</li>
<li>The n8n-mcp instance, lacking proper validation, incorporates the malicious ID into the outbound URL path.</li>
<li>The n8n-mcp instance initiates an HTTP request using the constructed URL, including the configured n8n API key.</li>
<li>The request is redirected to a different endpoint within the same origin.</li>
<li>The attacker gains access to resources or performs actions on the redirected endpoint, bypassing intended access controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to significant damage. The path traversal and SSRF vulnerabilities can allow attackers to bypass access controls and gain unauthorized access to internal resources, potentially leading to data breaches or system compromise. The exposure of sensitive information in telemetry data can compromise API keys, secrets, and other credentials, enabling further attacks and unauthorized access to external services. While specific victim counts are unavailable, organizations using affected versions of n8n-mcp are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>n8n-mcp &gt;= 2.50.1</code> to remediate the vulnerabilities (see Patched versions).</li>
<li>Apply network access restrictions (firewall, reverse-proxy ACL, or VPN) to the MCP HTTP port, allowing only trusted callers to access it, mitigating issues (1) and (2). Alternatively, switch to stdio mode to eliminate the HTTP attack surface (see Workarounds).</li>
<li>Disable telemetry by setting <code>N8N_MCP_TELEMETRY_DISABLED=true</code> in the environment before starting the server, or run <code>npx n8n-mcp telemetry disable</code> once, addressing issue (3) (see Workarounds).</li>
<li>Monitor network traffic for unexpected outbound connections originating from the n8n-mcp instance, potentially indicating SSRF attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>ssrf</category><category>telemetry</category><category>information-disclosure</category></item></channel></rss>