Description
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the /mcp-oauth/register endpoint accepted OAuth client registrations without authentication, allowing arbitrary redirect_uri values to be registered. When a user denies the MCP OAuth consent dialog, the handleDeny handler redirects the user to the registered redirect_uri without validation, enabling an open redirect to an attacker-controlled URL. An attacker can craft a phishing link and send it to a victim; if the victim clicks "Deny" on the consent page, they are silently redirected to an external site. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
INFO
Published Date :
2026-05-04T18:28:43.069Z
Last Modified :
2026-05-04T19:56:27.611Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-42230 vulnerability.
| Vendors | Products |
|---|---|
| N8n |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-42230.