CVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhook ID. This issue has been patched in version 2.2.2. A temporary workaround for this issue involves users deactivating affected workflows or restricting access to workflows containing Stripe Trigger nodes to trusted users only.
AI Analysis
Technical Summary
The vulnerability CVE-2026-21894 affects the n8n open source workflow automation platform, specifically versions from 0.150.0 up to but not including 2.2.2. The issue resides in the Stripe Trigger node, which is designed to listen for Stripe webhook events to trigger workflows. When a webhook endpoint is registered, n8n generates and stores a Stripe webhook signing secret intended to verify the authenticity of incoming webhook requests. However, due to a design flaw, incoming webhook requests are not validated against this secret. This allows any HTTP client aware of the webhook URL to send a POST request with a matching event type, causing the workflow to execute as if a legitimate Stripe event was received. The webhook URL includes a high-entropy UUID, which reduces the likelihood of random discovery, but authenticated n8n users can view this URL, increasing the risk of targeted attacks. An attacker exploiting this vulnerability could fake payment or subscription events, potentially manipulating business logic, financial records, or triggering unintended automated actions downstream. The vulnerability does not require authentication or user interaction, and no availability or confidentiality impact is noted, but integrity is significantly affected. The issue has been addressed in n8n version 2.2.2. Until upgrading, recommended mitigations include deactivating workflows using the Stripe Trigger node or restricting access to these workflows to trusted users only. No public exploits have been reported to date.
Potential Impact
For European organizations using n8n with Stripe Trigger workflows, this vulnerability poses a risk of unauthorized workflow execution, potentially leading to fraudulent financial event processing or manipulation of automated business processes. The integrity of payment-related data and subscription management could be compromised, resulting in financial discrepancies, erroneous customer billing, or unauthorized service provisioning. While the confidentiality and availability of systems are not directly impacted, the trustworthiness of automated workflows is undermined, which could damage operational reliability and compliance with financial regulations such as GDPR and PSD2. Organizations in sectors heavily reliant on automated payment processing, such as e-commerce, fintech, and SaaS providers, are particularly at risk. The medium severity rating reflects the moderate ease of exploitation balanced against the significant impact on data integrity. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments where the webhook URL might be exposed to insiders or through misconfiguration.
Mitigation Recommendations
1. Upgrade n8n installations to version 2.2.2 or later immediately to apply the official patch that verifies Stripe webhook signatures properly. 2. Until patching is possible, deactivate any workflows that use the Stripe Trigger node to prevent unauthorized triggering. 3. Restrict access to workflows containing Stripe Trigger nodes to a minimal set of trusted and authenticated users to reduce the risk of URL exposure. 4. Implement network-level controls such as IP whitelisting or firewall rules to limit incoming webhook requests to known Stripe IP ranges. 5. Monitor workflow execution logs for unusual or unexpected Stripe event triggers that could indicate exploitation attempts. 6. Educate administrators and developers about the importance of protecting webhook URLs and secrets, avoiding sharing them unnecessarily. 7. Consider adding additional verification layers in workflows, such as validating event payloads against Stripe’s API or implementing custom authentication checks. 8. Review and audit all automated workflows that depend on external webhook triggers to ensure they have appropriate security controls and fail-safes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
Description
n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhook ID. This issue has been patched in version 2.2.2. A temporary workaround for this issue involves users deactivating affected workflows or restricting access to workflows containing Stripe Trigger nodes to trusted users only.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-21894 affects the n8n open source workflow automation platform, specifically versions from 0.150.0 up to but not including 2.2.2. The issue resides in the Stripe Trigger node, which is designed to listen for Stripe webhook events to trigger workflows. When a webhook endpoint is registered, n8n generates and stores a Stripe webhook signing secret intended to verify the authenticity of incoming webhook requests. However, due to a design flaw, incoming webhook requests are not validated against this secret. This allows any HTTP client aware of the webhook URL to send a POST request with a matching event type, causing the workflow to execute as if a legitimate Stripe event was received. The webhook URL includes a high-entropy UUID, which reduces the likelihood of random discovery, but authenticated n8n users can view this URL, increasing the risk of targeted attacks. An attacker exploiting this vulnerability could fake payment or subscription events, potentially manipulating business logic, financial records, or triggering unintended automated actions downstream. The vulnerability does not require authentication or user interaction, and no availability or confidentiality impact is noted, but integrity is significantly affected. The issue has been addressed in n8n version 2.2.2. Until upgrading, recommended mitigations include deactivating workflows using the Stripe Trigger node or restricting access to these workflows to trusted users only. No public exploits have been reported to date.
Potential Impact
For European organizations using n8n with Stripe Trigger workflows, this vulnerability poses a risk of unauthorized workflow execution, potentially leading to fraudulent financial event processing or manipulation of automated business processes. The integrity of payment-related data and subscription management could be compromised, resulting in financial discrepancies, erroneous customer billing, or unauthorized service provisioning. While the confidentiality and availability of systems are not directly impacted, the trustworthiness of automated workflows is undermined, which could damage operational reliability and compliance with financial regulations such as GDPR and PSD2. Organizations in sectors heavily reliant on automated payment processing, such as e-commerce, fintech, and SaaS providers, are particularly at risk. The medium severity rating reflects the moderate ease of exploitation balanced against the significant impact on data integrity. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments where the webhook URL might be exposed to insiders or through misconfiguration.
Mitigation Recommendations
1. Upgrade n8n installations to version 2.2.2 or later immediately to apply the official patch that verifies Stripe webhook signatures properly. 2. Until patching is possible, deactivate any workflows that use the Stripe Trigger node to prevent unauthorized triggering. 3. Restrict access to workflows containing Stripe Trigger nodes to a minimal set of trusted and authenticated users to reduce the risk of URL exposure. 4. Implement network-level controls such as IP whitelisting or firewall rules to limit incoming webhook requests to known Stripe IP ranges. 5. Monitor workflow execution logs for unusual or unexpected Stripe event triggers that could indicate exploitation attempts. 6. Educate administrators and developers about the importance of protecting webhook URLs and secrets, avoiding sharing them unnecessarily. 7. Consider adding additional verification layers in workflows, such as validating event payloads against Stripe’s API or implementing custom authentication checks. 8. Review and audit all automated workflows that depend on external webhook triggers to ensure they have appropriate security controls and fail-safes.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T17:24:36.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695f815bc901b06321d3faf7
Added to database: 1/8/2026, 10:05:15 AM
Last enriched: 1/8/2026, 10:20:35 AM
Last updated: 1/9/2026, 5:39:07 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14886: CWE-862 Missing Authorization in shoheitanaka Japanized for WooCommerce
MediumCVE-2026-22636
LowCVE-2026-22635
LowCVE-2026-22634
LowCVE-2026-22633
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.