Home

Description

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API. The buildStreamAuthOptions() function builds authentication options for SSE/streaming endpoints. When the auth mode is basic, it returns an auth.Options struct with BasicAuthEnabled: true but AuthRequired defaults to false (Go zero value). The authentication middleware at internal/service/frontend/auth/middleware.go allows unauthenticated requests when AuthRequired is false. This vulnerability is fixed in 2.2.4.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-13 | Updated 2026-03-13 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

< 2.2.4
affected

References

github.com/...g/dagu/security/advisories/GHSA-9wmw-9wph-2vwp

github.com/dagu-org/dagu/pull/1752

github.com/...ommit/064616c9b80c04824c1c7c357308f77f3f24d775

github.com/dagu-org/dagu/releases/tag/v2.2.4

cve.org (CVE-2026-31882)

nvd.nist.gov (CVE-2026-31882)

Download JSON