Home

Description

Hatchet is a platform for orchestrating background tasks, AI agents, and durable workflows at scale. Prior to 0.83.39, a missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belonging to that tenant, and receive task metadata for that DAG. This vulnerability is fixed in 0.83.39.

PUBLISHED Reserved 2026-04-28 | Published 2026-05-14 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-863: Incorrect Authorization

Product status

< 0.83.38
affected

References

github.com/...atchet/security/advisories/GHSA-55gc-6fmc-fpx9

cve.org (CVE-2026-42572)

nvd.nist.gov (CVE-2026-42572)

Download JSON