


Perceptive Security
SOC/SIEM Consultancy

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all…
Published:
12 maart 2026 om 23:00:00
Alert date:
13 maart 2026 om 20:06:20
Source:
nvd.nist.gov
Web Technologies, Identity & Access
CVE-2026-31882 affects Dagu workflow engine versions prior to 2.2.4. When configured with HTTP Basic authentication, all Server-Sent Events (SSE) endpoints are accessible without credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status, effectively bypassing REST API authentication. The vulnerability stems from the buildStreamAuthOptions() function setting BasicAuthEnabled to true but leaving AuthRequired as false. The issue is fixed in version 2.2.4.
Technical details
Mitigation steps:
Affected products:
Dagu
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-31882
https://github.com/dagu-org/dagu/commit/064616c9b80c04824c1c7c357308f77f3f24d775
https://github.com/dagu-org/dagu/pull/1752
https://github.com/dagu-org/dagu/releases/tag/v2.2.4
https://github.com/dagu-org/dagu/security/advisories/GHSA-9wmw-9wph-2vwp
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
