<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cwe-918 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cwe-918/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 18:12:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cwe-918/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</link><pubDate>Thu, 30 Apr 2026 18:12:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</guid><description>The n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.</description><content:encoded><![CDATA[<p>The n8n-mcp library, when embedded as an SDK, contains a server-side request forgery (SSRF) vulnerability. The vulnerability lies in the <code>SSRFProtection.validateUrlSync()</code> function, specifically within the <code>N8NDocumentationMCPServer</code> constructor, <code>getN8nApiClient()</code>, and <code>validateInstanceContext()</code> methods. This synchronous validator lacks IPv6 checks, allowing IPv4-mapped IPv6 addresses (e.g., <code>http://[::ffff:169.254.169.254]</code>) to bypass existing protections against cloud metadata, localhost, and private IP ranges. An attacker who can control the <code>n8nApiUrl</code> parameter can exploit this flaw to force the server to make HTTP requests to internal or external services. This issue affects deployments embedding n8n-mcp as an SDK using <code>N8NDocumentationMCPServer</code> or <code>N8NMCPEngine</code> with user-supplied <code>InstanceContext</code> on versions v2.47.4 through v2.47.13. Version v2.47.14 and later contain the patch for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable n8n-mcp deployment embedding the SDK and using a user-supplied <code>InstanceContext</code>.</li>
<li>The attacker crafts a malicious <code>n8nApiUrl</code> containing an IPv4-mapped IPv6 address, such as <code>http://[::ffff:169.254.169.254]</code>.</li>
<li>The attacker supplies the crafted <code>n8nApiUrl</code> to the vulnerable <code>N8NDocumentationMCPServer</code> constructor or <code>getN8nApiClient()</code> method.</li>
<li>The <code>validateInstanceContext()</code> function calls <code>SSRFProtection.validateUrlSync()</code> to validate the URL.</li>
<li>The <code>validateUrlSync()</code> function fails to properly validate the IPv4-mapped IPv6 address.</li>
<li>The server issues an HTTP request to the attacker-specified target using the bypassed URL.</li>
<li>The <code>x-n8n-api-key</code> header is forwarded to the attacker-controlled target.</li>
<li>The response body from the target is returned to the attacker, allowing the attacker to gather sensitive information from internal services or cloud metadata endpoints.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to perform unauthorized actions, such as accessing sensitive information from cloud metadata endpoints (AWS IMDS, GCP, Azure, Alibaba, Oracle), RFC1918 private networks, or localhost services. The attacker can also gain access to the <code>n8nApiKey</code>, which is forwarded in the <code>x-n8n-api-key</code> header, potentially leading to further compromise of the n8n instance. This vulnerability impacts deployments embedding n8n-mcp as an SDK between versions v2.47.4 and v2.47.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n-mcp to version v2.47.14 or later to patch the vulnerability as described in the advisory.</li>
<li>Implement a network-level block on outbound traffic from the n8n-mcp process to RFC1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), link-local <code>169.254.0.0/16</code>, and cloud metadata endpoints as a defense-in-depth measure.</li>
<li>Deploy the Sigma rule <code>Detect N8N MCP SSRF Attempt via IPv6 Bypass</code> to identify exploitation attempts by detecting outbound connections to internal IPs using IPv6 mapped IPv4 address.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cwe-918</category><category>n8n-mcp</category></item></channel></rss>