CVE-2026-42236
HIGHn8n: Unauthenticated Denial of Service via MCP Client Registration
Title source: cnaDescription
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
References (1)
Core 1
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/n8n-io/n8n/security/advisories/GHSA-49m9-pgww-9vq6
Scores
CVSS v3
7.5
EPSS
0.0014
EPSS Percentile
33.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (6)
n8n/n8n
2.18.0
n8n/n8n
< 1.123.32
n8n-io/n8n
< 1.123.32
n8n-io/n8n
>= 2.17.0, < 2.17.4
n8n-io/n8n
>= 2.18.0, < 2.18.1
npm/n8n
0 - 1.123.32npm
Published
May 04, 2026
Tracked Since
May 05, 2026