CVE-2026-39974
n8n · n8n-MCP
The n8n-MCP server contains an unspecified vulnerability that may expose sensitive documentation, properties, and operations to unauthorized AI assistants.
Executive summary
A high-severity vulnerability in the n8n-MCP server poses a significant risk of unauthorized information disclosure regarding sensitive node documentation and operations.
Vulnerability
The vulnerability relates to the Model Context Protocol (MCP) server implementation within n8n. It involves improper handling of access controls or data exposure, potentially allowing unauthorized AI entities to interact with or extract sensitive operational configuration data.
Business impact
Successful exploitation could lead to the exposure of internal workflow documentation and operational properties, facilitating reconnaissance for further attacks against the n8n environment. Given the CVSS score of 8.5, the risk to intellectual property and internal configuration security is substantial.
Remediation
Immediate Action: Review the official n8n security advisory and apply the latest security patches for the n8n-MCP component immediately.
Proactive Monitoring: Audit logs for unusual access requests to the MCP interface and monitor for unexpected AI-driven queries against sensitive endpoints.
Compensating Controls: Restrict network access to the MCP server endpoint to trusted IP ranges and implement robust authentication mechanisms for all AI-assistant integrations.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations utilizing n8n-MCP must treat this issue with high urgency. Ensure all components are updated to the latest supported versions and audit existing integrations to ensure that AI access is limited to the minimum required functionality.