Skip to content
CVSS 7.5 · HIGH

CVE-2026-42236

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Ver en NVD

Análisis

n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 are vulnerable to an unauthenticated memory exhaustion attack. Attackers can crash self-hosted n8n instances by sending large payloads to an OAuth registration endpoint that remains active even when disabled, making updates critical for maintaining service availability.

Severidad

Puntaje: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: NONE
I: NONE
A: HIGH
Tipo de falla (CWE): CWE-770

EPSS

Probabilidad de explotación (próx. 30 días): 0.0014 (0.1%)
Percentil: 33.8%
EPSS: 2026-05-06

Afecta

n8n:n8n

Descripción técnica

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Publicada: 4/5/2026, 19:16:06
Última modificación: 6/5/2026, 17:16:02

Referencias

InicioEventosBlogRecursosEquipo