Authentication Bypass in n8n Workflows via Stripe Trigger Node
CVE-2026-21894

6.5MEDIUM

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
8 January 2026

What is CVE-2026-21894?

An authentication bypass vulnerability exists in the n8n workflow automation platform affecting versions from 0.150.0 to before 2.2.2. This issue arises within the Stripe Trigger node, which fails to verify incoming webhook requests against a stored Stripe webhook signing secret. Consequently, unauthenticated actors can send crafted Stripe webhook events to trigger workflows as though they originated from genuine Stripe events. This raises significant security risks, particularly for workflows reliant on the Stripe Trigger, exposing them to potential exploitation, including the manipulation of payment or subscription events. Users can mitigate risks by upgrading to version 2.2.2 or by restricting access to workflows that employ the Stripe Trigger node.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

n8n >= 0.150.0, < 2.2.2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.