<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-42235 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-42235/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 21:25:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-42235/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n MCP OAuth Client XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-n8n-xss-oauth/</link><pubDate>Wed, 29 Apr 2026 21:25:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-n8n-xss-oauth/</guid><description>n8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.</description><content:encoded><![CDATA[<p>n8n, a workflow automation platform, is susceptible to a cross-site scripting (XSS) vulnerability (CVE-2026-42235) related to the registration of malicious MCP OAuth clients. An unauthenticated attacker can register an OAuth client with a crafted <code>client_name</code> containing malicious JavaScript. This vulnerability exists in versions prior to 2.14.2 and also affects versions 2.17.0 to 2.17.3 and 2.18.0. A successful exploit allows the attacker to execute arbitrary JavaScript within a victim&rsquo;s authenticated n8n session, potentially leading to credential theft, session token theft, workflow manipulation, or privilege escalation. Defenders should prioritize patching to version 2.14.2 or later to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker registers a malicious MCP OAuth client with a crafted <code>client_name</code> containing XSS payload.</li>
<li>A victim user navigates to the n8n instance and is presented with the malicious OAuth consent dialog.</li>
<li>The victim user authorizes the malicious OAuth client, unknowingly injecting the attacker&rsquo;s script into their session.</li>
<li>A second user, possibly an administrator, revokes the OAuth access granted to the malicious client.</li>
<li>This revocation triggers a toast notification to the original victim user.</li>
<li>The toast notification renders the attacker&rsquo;s injected script from the crafted <code>client_name</code>.</li>
<li>The victim user clicks on the link within the toast notification.</li>
<li>The injected JavaScript executes within the victim&rsquo;s authenticated n8n browser session, enabling the attacker to perform malicious actions such as stealing credentials, manipulating workflows, or escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can lead to significant compromise of an n8n instance. Attackers can steal user credentials and session tokens, allowing them to impersonate legitimate users. Malicious actors could also modify or create workflows, leading to data breaches, system disruption, or unauthorized access. Privilege escalation is also possible, potentially granting attackers administrative control over the n8n platform. The number of potential victims depends on the exposure and user base of the vulnerable n8n instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 2.14.2 or later to patch CVE-2026-42235, as recommended in the advisory.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious n8n MCP OAuth Client Registration</code> to identify attempts to register OAuth clients with suspicious names.</li>
<li>If immediate patching is not feasible, restrict access to the n8n instance and the MCP OAuth registration endpoint to trusted users only, as suggested in the advisory&rsquo;s workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>oauth</category><category>n8n</category><category>CVE-2026-42235</category></item></channel></rss>