N8n < 2.2.2 Unauthenticated Forged Webhooks

medium Web App Scanning Plugin ID 115102

Synopsis

N8n < 2.2.2 Unauthenticated Forged Webhooks

Description

According to its banner, the version of n8n running on the remote host is 0.150 or later and before 2.2.2. It is, therefore, affected by an authentication bypass in the Stripe trigger, allowing unauthenticated parties to trigger workflows by sending forget Stripe webhook events.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to n8n version 2.2.2 or later.

See Also

https://docs.n8n.io/release-notes/

https://github.com/n8n-io/n8n/security/advisories/GHSA-jf52-3f2h-h9j5

Plugin Details

Severity: Medium

ID: 115102

Type: remote

Published: 1/8/2026

Updated: 1/8/2026

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:C/A:N

CVSS Score Source: CVE-2026-21894

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

CVSS Score Source: CVE-2026-21894

Vulnerability Information

CPE: cpe:2.3:a:n8n:n8n:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/6/2026

Reference Information

CVE: CVE-2026-21894