Skip to content
CVSS 7.5 · HIGH

CVE-2026-42236

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

View on NVD

Analysis

n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 are vulnerable to an unauthenticated memory exhaustion attack. Attackers can crash self-hosted n8n instances by sending large payloads to an OAuth registration endpoint that remains active even when disabled, making updates critical for maintaining service availability.

Severity

Score: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: NONE
I: NONE
A: HIGH
Weakness (CWE): CWE-770

EPSS

Probability of exploitation (next 30 days): 0.0014 (0.1%)
Percentile: 33.8%
EPSS: 2026-05-06

Affects

n8n:n8n

Technical description

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Published: 5/4/2026, 7:16:06 PM
Last modified: 5/6/2026, 5:16:02 PM

References

HomeEventsBlogResourcesTeam