The vulnerability, identified as GHSA-mqpr-49jj-32rc, is an authentication bypass in the n8n GitHub Trigger Node. The root cause is the failure to verify the HMAC-SHA256 signature of incoming webhook requests. An attacker can exploit this by sending a POST request to the known webhook URL, which would trigger the associated workflow with malicious data.
The analysis of the provided patches, specifically commit afe322325502f448b33bff1db1575e4447c28a36, points directly to the vulnerable function. The webhook method within the GithubTrigger class in packages/nodes-base/nodes/Github/GithubTrigger.node.ts is the function responsible for handling these incoming requests. Before the patch, this function would immediately start processing the request body. The patch remediates the vulnerability by adding a signature verification step at the very beginning of this webhook method. Any request that fails this check is now rejected with a 401 Unauthorized error. Therefore, during exploitation of a vulnerable version, the GithubTrigger.webhook function would be the primary indicator in a runtime profile or stack trace.