CVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
CVE-2026-21894 is an authentication bypass vulnerability in the n8n workflow automation platform affecting versions 0. 150. 0 to before 2. 2. 2. The flaw exists in the Stripe Trigger node, where incoming webhook requests are not verified against the stored Stripe webhook signing secret. This allows unauthenticated attackers who know the webhook URL to send forged Stripe webhook events, triggering workflows without legitimate Stripe events. The risk is somewhat mitigated by the high-entropy UUID in the webhook URL, but authenticated users can view this URL, increasing exposure. Exploitation could lead to fake payment or subscription events influencing downstream processes. The vulnerability has been patched in version 2.
AI Analysis
Technical Summary
The vulnerability CVE-2026-21894 affects the n8n open source workflow automation platform, specifically versions from 0.150.0 up to but not including 2.2.2. The issue resides in the Stripe Trigger node, which is designed to listen for Stripe webhook events to automate workflows based on payment or subscription activities. When a Stripe webhook endpoint is registered, n8n generates and stores a webhook signing secret intended to verify incoming webhook requests. However, due to a design flaw, incoming HTTP POST requests to the webhook URL are not validated against this secret. Consequently, any unauthenticated attacker who discovers the webhook URL—which includes a high-entropy UUID—can craft and send forged Stripe webhook events. These fake events cause the associated workflows to execute as if legitimate Stripe events were received. This can lead to unauthorized triggering of workflows that may perform critical business functions such as updating databases, sending notifications, or modifying subscription statuses. Although the webhook URL’s complexity reduces the likelihood of random discovery, authenticated n8n users with access to the workflows can view the URL, increasing the risk of insider threats or accidental leaks. The vulnerability does not require authentication or user interaction to exploit, making it remotely exploitable over the network. The CVSS 3.1 score of 6.5 reflects a medium severity, with low confidentiality impact (as no sensitive data is directly exposed), high integrity impact (due to unauthorized workflow execution), and no availability impact. No known exploits have been reported in the wild. The issue has been addressed in n8n version 2.2.2, which implements proper verification of webhook requests against the stored signing secret. As a temporary mitigation, users are advised to deactivate workflows using the Stripe Trigger node or restrict access to these workflows to trusted users only.
Potential Impact
For European organizations using n8n with Stripe Trigger workflows, this vulnerability poses a significant risk to the integrity of automated business processes. Attackers could forge payment or subscription events, potentially causing financial discrepancies, unauthorized service activations or cancellations, and erroneous data processing. This could lead to financial losses, reputational damage, and compliance issues, especially under GDPR if personal data is mishandled as a result. The risk is heightened in organizations where multiple users have access to workflow configurations, increasing the chance of URL exposure. Since n8n is used in various industries including fintech, e-commerce, and SaaS, the impact could be broad. However, the absence of availability impact limits operational disruption. The medium severity rating suggests that while the threat is serious, it is not catastrophic if mitigated promptly. European companies relying on automated workflows for payment processing should prioritize patching or mitigation to maintain process integrity and regulatory compliance.
Mitigation Recommendations
1. Upgrade n8n installations to version 2.2.2 or later, which includes the patch verifying Stripe webhook requests against the stored signing secret. 2. Until patching is possible, deactivate all workflows that use the Stripe Trigger node to prevent unauthorized triggering. 3. Restrict access to workflows containing Stripe Trigger nodes strictly to trusted and authorized users to minimize the risk of webhook URL exposure. 4. Implement network-level controls such as IP whitelisting or firewall rules to limit incoming requests to the webhook URL from known Stripe IP ranges. 5. Monitor workflow execution logs for unusual or unexpected Stripe event triggers that could indicate exploitation attempts. 6. Educate users with access to n8n workflows about the sensitivity of webhook URLs and enforce strict credential management policies. 7. Consider adding additional verification layers in workflows to validate event authenticity, such as checking event payload signatures manually if feasible. 8. Regularly audit n8n configurations and access controls to ensure compliance with security best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
Description
CVE-2026-21894 is an authentication bypass vulnerability in the n8n workflow automation platform affecting versions 0. 150. 0 to before 2. 2. 2. The flaw exists in the Stripe Trigger node, where incoming webhook requests are not verified against the stored Stripe webhook signing secret. This allows unauthenticated attackers who know the webhook URL to send forged Stripe webhook events, triggering workflows without legitimate Stripe events. The risk is somewhat mitigated by the high-entropy UUID in the webhook URL, but authenticated users can view this URL, increasing exposure. Exploitation could lead to fake payment or subscription events influencing downstream processes. The vulnerability has been patched in version 2.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-21894 affects the n8n open source workflow automation platform, specifically versions from 0.150.0 up to but not including 2.2.2. The issue resides in the Stripe Trigger node, which is designed to listen for Stripe webhook events to automate workflows based on payment or subscription activities. When a Stripe webhook endpoint is registered, n8n generates and stores a webhook signing secret intended to verify incoming webhook requests. However, due to a design flaw, incoming HTTP POST requests to the webhook URL are not validated against this secret. Consequently, any unauthenticated attacker who discovers the webhook URL—which includes a high-entropy UUID—can craft and send forged Stripe webhook events. These fake events cause the associated workflows to execute as if legitimate Stripe events were received. This can lead to unauthorized triggering of workflows that may perform critical business functions such as updating databases, sending notifications, or modifying subscription statuses. Although the webhook URL’s complexity reduces the likelihood of random discovery, authenticated n8n users with access to the workflows can view the URL, increasing the risk of insider threats or accidental leaks. The vulnerability does not require authentication or user interaction to exploit, making it remotely exploitable over the network. The CVSS 3.1 score of 6.5 reflects a medium severity, with low confidentiality impact (as no sensitive data is directly exposed), high integrity impact (due to unauthorized workflow execution), and no availability impact. No known exploits have been reported in the wild. The issue has been addressed in n8n version 2.2.2, which implements proper verification of webhook requests against the stored signing secret. As a temporary mitigation, users are advised to deactivate workflows using the Stripe Trigger node or restrict access to these workflows to trusted users only.
Potential Impact
For European organizations using n8n with Stripe Trigger workflows, this vulnerability poses a significant risk to the integrity of automated business processes. Attackers could forge payment or subscription events, potentially causing financial discrepancies, unauthorized service activations or cancellations, and erroneous data processing. This could lead to financial losses, reputational damage, and compliance issues, especially under GDPR if personal data is mishandled as a result. The risk is heightened in organizations where multiple users have access to workflow configurations, increasing the chance of URL exposure. Since n8n is used in various industries including fintech, e-commerce, and SaaS, the impact could be broad. However, the absence of availability impact limits operational disruption. The medium severity rating suggests that while the threat is serious, it is not catastrophic if mitigated promptly. European companies relying on automated workflows for payment processing should prioritize patching or mitigation to maintain process integrity and regulatory compliance.
Mitigation Recommendations
1. Upgrade n8n installations to version 2.2.2 or later, which includes the patch verifying Stripe webhook requests against the stored signing secret. 2. Until patching is possible, deactivate all workflows that use the Stripe Trigger node to prevent unauthorized triggering. 3. Restrict access to workflows containing Stripe Trigger nodes strictly to trusted and authorized users to minimize the risk of webhook URL exposure. 4. Implement network-level controls such as IP whitelisting or firewall rules to limit incoming requests to the webhook URL from known Stripe IP ranges. 5. Monitor workflow execution logs for unusual or unexpected Stripe event triggers that could indicate exploitation attempts. 6. Educate users with access to n8n workflows about the sensitivity of webhook URLs and enforce strict credential management policies. 7. Consider adding additional verification layers in workflows to validate event authenticity, such as checking event payload signatures manually if feasible. 8. Regularly audit n8n configurations and access controls to ensure compliance with security best practices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T17:24:36.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695f815bc901b06321d3faf7
Added to database: 1/8/2026, 10:05:15 AM
Last enriched: 1/15/2026, 12:43:13 PM
Last updated: 2/6/2026, 8:58:04 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
‘DKnife’ Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks
MediumInfy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
MediumAISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
MediumCVE-2026-2011: SQL Injection in itsourcecode Student Management System
MediumCVE-2026-24930: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.