n8n CVE-2026-42236

HIGH
Allocation of Resources Without Limits or Throttling (CWE-770)
2026-04-29 https://github.com/n8n-io/n8n GHSA-49m9-pgww-9vq6
Share

Lifecycle Timeline

2
Source Code Evidence Fetched
Apr 29, 2026 - 22:01 vuln.today
Analysis Generated
Apr 29, 2026 - 22:01 vuln.today

DescriptionNVD

Impact

The MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance.

The patches address the unbound registration with an upper bound of registered clients and disabling creation when MCP is disabled on the instance. Mean to restrict the payload size of requests already exist and can be used to control additional risks.

Patches

The issue has been fixed in n8n versions 1.123.32, 2.17.4, and 2.18.1. Users should upgrade to one of these versions or later to remediate the vulnerability.

Workarounds

If upgrading is not immediately possible, administrators should consider the following temporary mitigations:

  • Restrict network access to the n8n instance to prevent requests from untrusted sources.
  • Reduce the maximum accepted payload size by lowering the N8N_PAYLOAD_SIZE_MAX environment variable from its default value.

These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

AnalysisAI

Unauthenticated remote attackers can crash n8n workflow automation instances by flooding the MCP OAuth client registration endpoint with large payloads, exhausting server memory and causing denial of service. The vulnerability affects all n8n instances regardless of whether MCP (Model Context Protocol) access is enabled, as the endpoint lacks authentication and resource controls. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all n8n instances in production and verify current versions against patched releases (1.123.32, 2.17.4, or 2.18.1). Within 7 days: Upgrade all affected instances to patched versions or implement network-level access controls blocking unauthenticated requests to the MCP OAuth registration endpoint. …

Sign in for detailed remediation steps.

Share

CVE-2026-42236 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy