top of page
perceptive_background_267k.jpg

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all…

Published:

12 maart 2026 om 23:00:00

Alert date:

13 maart 2026 om 20:06:20

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

CVE-2026-31882 affects Dagu workflow engine versions prior to 2.2.4. When configured with HTTP Basic authentication, all Server-Sent Events (SSE) endpoints are accessible without credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status, effectively bypassing REST API authentication. The vulnerability stems from the buildStreamAuthOptions() function setting BasicAuthEnabled to true but leaving AuthRequired as false. The issue is fixed in version 2.2.4.

Technical details

Mitigation steps:

Affected products:

Dagu

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page