Логотип exploitDog
bind:CVE-2026-21894
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-21894

Количество 2

Количество 2

nvd логотип

CVE-2026-21894

около 1 месяца назад

n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhoo

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-jf52-3f2h-h9j5

около 1 месяца назад

n8n's Missing Stripe-Signature Verification Allows Unauthenticated Forged Webhooks

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-21894

n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhoo

CVSS3: 6.5
0%
Низкий
около 1 месяца назад
github логотип
GHSA-jf52-3f2h-h9j5

n8n's Missing Stripe-Signature Verification Allows Unauthenticated Forged Webhooks

CVSS3: 6.5
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу