Skip to content

Commit 2d64d93

Browse files
1 parent 8fcdbca commit 2d64d93

File tree

1 file changed

+86
-0
lines changed

1 file changed

+86
-0
lines changed
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mqpr-49jj-32rc",
4+
"modified": "2026-02-26T15:58:34Z",
5+
"published": "2026-02-26T15:58:34Z",
6+
"aliases": [],
7+
"summary": "n8n: Webhook Forgery on Github Webhook Trigger",
8+
"details": "## Impact\nAn attacker who knows the webhook URL of a workflow using the GitHub Webhook Trigger node could send unsigned POST requests and trigger the workflow with arbitrary data. The node did not implement the HMAC-SHA256 signature verification that GitHub provides to authenticate webhook deliveries, allowing any party to spoof GitHub webhook events.\n\n## Patches\nThe issue has been fixed in n8n versions 2.5.0 and 1.123.15. Users should upgrade to one of these versions or later to remediate the vulnerability.\n\n## Workarounds\nIf upgrading is not immediately possible, administrators should consider the following temporary mitigations:\n- Limit workflow creation and editing permissions to fully trusted users only.\n- Restrict network access to the n8n webhook endpoint to known GitHub webhook IP ranges.\n\nThese workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N"
13+
},
14+
{
15+
"type": "CVSS_V4",
16+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N"
17+
}
18+
],
19+
"affected": [
20+
{
21+
"package": {
22+
"ecosystem": "npm",
23+
"name": "n8n"
24+
},
25+
"ranges": [
26+
{
27+
"type": "ECOSYSTEM",
28+
"events": [
29+
{
30+
"introduced": "0"
31+
},
32+
{
33+
"fixed": "1.123.15"
34+
}
35+
]
36+
}
37+
]
38+
},
39+
{
40+
"package": {
41+
"ecosystem": "npm",
42+
"name": "n8n"
43+
},
44+
"ranges": [
45+
{
46+
"type": "ECOSYSTEM",
47+
"events": [
48+
{
49+
"introduced": "2.0.0"
50+
},
51+
{
52+
"fixed": "2.5.0"
53+
}
54+
]
55+
}
56+
]
57+
}
58+
],
59+
"references": [
60+
{
61+
"type": "WEB",
62+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-mqpr-49jj-32rc"
63+
},
64+
{
65+
"type": "WEB",
66+
"url": "https://github.com/n8n-io/n8n/commit/a19347a6bc9a96d5065ac77d25a811e46178c578"
67+
},
68+
{
69+
"type": "WEB",
70+
"url": "https://github.com/n8n-io/n8n/commit/afe322325502f448b33bff1db1575e4447c28a36"
71+
},
72+
{
73+
"type": "PACKAGE",
74+
"url": "https://github.com/n8n-io/n8n"
75+
}
76+
],
77+
"database_specific": {
78+
"cwe_ids": [
79+
"CWE-290"
80+
],
81+
"severity": "MODERATE",
82+
"github_reviewed": true,
83+
"github_reviewed_at": "2026-02-26T15:58:34Z",
84+
"nvd_published_at": null
85+
}
86+
}

0 commit comments

Comments
 (0)