CVE-2026-21894
MEDIUMIf your team uses n8n for AI workflow automation, any active Stripe Trigger workflow is exposed to unauthorized execution via forged webhook events — upgrade to 2.2.2 immediately or deactivate affected workflows now. The risk is highest in environments where n8n orchestrates AI agents with access to sensitive downstream systems, financial logic, or provisioning actions. Do not rely on URL obscurity as a control.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
Do you use n8n? You're affected.
Severity & Risk
Recommended Action
- 1. PATCH: Upgrade n8n to version 2.2.2 immediately — this is a one-line fix. 2. INTERIM: Deactivate all workflows using the Stripe Trigger node until patched. 3. ACCESS CONTROL: Restrict workflow view permissions to trusted users only — the webhook UUID is visible to any authenticated n8n user and cannot be rotated without recreating the webhook. 4. AUDIT: Inventory all Stripe Trigger workflows and assess downstream blast radius (provisioning, financial writes, AI agent tool invocations). 5. DETECT: Cross-reference n8n workflow execution logs against actual Stripe dashboard events — any Stripe Trigger firing without a matching Stripe event ID is suspicious.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhook ID. This issue has been patched in version 2.2.2. A temporary workaround for this issue involves users deactivating affected workflows or restricting access to workflows containing Stripe Trigger nodes to trusted users only.
Exploitation Scenario
An attacker — either a disgruntled insider or an external actor who phished an n8n user account — extracts the Stripe webhook URL from workflow configuration. They craft an HTTP POST to that URL with a JSON body mimicking a Stripe payment_intent.succeeded event matching the workflow's expected event type. Without signature verification, n8n executes the workflow as if a legitimate payment occurred. Downstream AI agent actions fire: a LangChain or LlamaIndex agent is invoked, premium access is provisioned, database records are updated, or a multi-step agentic pipeline executes with the attacker controlling the triggering context. No Stripe account, no valid HMAC signature, no cryptographic material required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N