Browse all 5 CVE security advisories affecting czlonkowski. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-44694 | n8n-MCP: Authenticated SSRF in n8n-mcp webhook and API client paths — n8n-mcpCWE-367 | - | - | 2026-05-08 |
| CVE-2026-42282 | n8n-MCP: Sensitive MCP tool-call arguments logged on authenticated requests in HTTP mode — n8n-mcpCWE-532 | 4.3 | Medium | 2026-05-08 |
| CVE-2026-41495 | n8n-MCP Logs Sensitive Request Data on Unauthorized /mcp Requests — n8n-mcpCWE-532 | 5.3 | Medium | 2026-05-08 |
| CVE-2026-42449 | n8n-MCP: IPv4-mapped IPv6 addresses bypass SSRF protection in validateUrlSync(), enabling full SSRF for SDK embedders — n8n-mcpCWE-918 | 8.5 | High | 2026-05-07 |
| CVE-2026-39974 | n8n-MCP has an Authenticated SSRF via instance-URL header in multi-tenant HTTP mode — n8n-mcpCWE-918 | 8.5 | High | 2026-04-09 |
This page lists every published CVE security advisory associated with czlonkowski. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.