CVE-2026-27598: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dagu-org dagu
CVE-2026-27598 is a high-severity path traversal vulnerability in dagu versions up to 1. 16. 7. The flaw exists in the CreateNewDAG API endpoint, which fails to validate DAG names before writing files to the filesystem. Authenticated users with DAG write permissions can exploit this to write arbitrary YAML files anywhere within the process's filesystem permissions. Since dagu executes DAG files as shell commands, an attacker can achieve remote code execution by overwriting DAG files or configuration files. No privileges beyond DAG write access are required, and no user interaction is needed beyond authentication. The vulnerability is fixed in versions after 1. 16. 7.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-27598 affects dagu, a workflow engine with a web UI, specifically versions up to and including 1.16.7. The issue arises from improper validation of the DAG name parameter in the CreateNewDAG API endpoint (POST /api/v1/dags). This parameter is used directly to write YAML files to the file store without sanitization, enabling path traversal (CWE-22). An authenticated user with DAG write permissions can craft a malicious DAG name containing path traversal sequences (e.g., ../) to write arbitrary files anywhere the dagu process has write access. Because dagu executes DAG files as shell commands, this can be leveraged to overwrite existing DAGs or configuration files, resulting in remote code execution (RCE). The vulnerability does not require elevated privileges beyond DAG write access and does not require additional user interaction. The flaw was addressed in commit e2ed589105d79273e4e6ac8eb31525f765bb3ce4, which implements proper validation and sanitization of DAG names to prevent path traversal. No known exploits are currently reported in the wild, but the potential for RCE makes this a critical risk for affected deployments.
Potential Impact
This vulnerability poses a significant risk to organizations using dagu workflow engine, as it allows authenticated users with DAG write permissions to execute arbitrary code remotely. The impact includes potential full system compromise, unauthorized data access, and disruption of workflow automation processes. Attackers could overwrite critical configuration files or inject malicious DAGs that execute shell commands, leading to data breaches, service outages, or lateral movement within the network. Since dagu is used to automate workflows, exploitation could also affect business-critical operations and lead to compliance violations. The ease of exploitation combined with the ability to achieve RCE elevates the threat level, especially in environments where multiple users have DAG write access or where dagu runs with elevated system privileges.
Mitigation Recommendations
Organizations should immediately upgrade dagu to a version later than 1.16.7 where the vulnerability is patched. Until upgrading, restrict DAG write permissions strictly to trusted and minimal users to reduce the attack surface. Implement network segmentation and access controls to limit exposure of the dagu API endpoint. Monitor logs for suspicious DAG creation requests containing path traversal patterns. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous file writes or process executions originating from dagu. Conduct regular audits of DAG files and configuration files to detect unauthorized modifications. Consider running dagu with least privilege, ensuring the process has minimal filesystem permissions to limit the impact of potential exploitation.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Canada, Australia, Netherlands
CVE-2026-27598: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dagu-org dagu
Description
CVE-2026-27598 is a high-severity path traversal vulnerability in dagu versions up to 1. 16. 7. The flaw exists in the CreateNewDAG API endpoint, which fails to validate DAG names before writing files to the filesystem. Authenticated users with DAG write permissions can exploit this to write arbitrary YAML files anywhere within the process's filesystem permissions. Since dagu executes DAG files as shell commands, an attacker can achieve remote code execution by overwriting DAG files or configuration files. No privileges beyond DAG write access are required, and no user interaction is needed beyond authentication. The vulnerability is fixed in versions after 1. 16. 7.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-27598 affects dagu, a workflow engine with a web UI, specifically versions up to and including 1.16.7. The issue arises from improper validation of the DAG name parameter in the CreateNewDAG API endpoint (POST /api/v1/dags). This parameter is used directly to write YAML files to the file store without sanitization, enabling path traversal (CWE-22). An authenticated user with DAG write permissions can craft a malicious DAG name containing path traversal sequences (e.g., ../) to write arbitrary files anywhere the dagu process has write access. Because dagu executes DAG files as shell commands, this can be leveraged to overwrite existing DAGs or configuration files, resulting in remote code execution (RCE). The vulnerability does not require elevated privileges beyond DAG write access and does not require additional user interaction. The flaw was addressed in commit e2ed589105d79273e4e6ac8eb31525f765bb3ce4, which implements proper validation and sanitization of DAG names to prevent path traversal. No known exploits are currently reported in the wild, but the potential for RCE makes this a critical risk for affected deployments.
Potential Impact
This vulnerability poses a significant risk to organizations using dagu workflow engine, as it allows authenticated users with DAG write permissions to execute arbitrary code remotely. The impact includes potential full system compromise, unauthorized data access, and disruption of workflow automation processes. Attackers could overwrite critical configuration files or inject malicious DAGs that execute shell commands, leading to data breaches, service outages, or lateral movement within the network. Since dagu is used to automate workflows, exploitation could also affect business-critical operations and lead to compliance violations. The ease of exploitation combined with the ability to achieve RCE elevates the threat level, especially in environments where multiple users have DAG write access or where dagu runs with elevated system privileges.
Mitigation Recommendations
Organizations should immediately upgrade dagu to a version later than 1.16.7 where the vulnerability is patched. Until upgrading, restrict DAG write permissions strictly to trusted and minimal users to reduce the attack surface. Implement network segmentation and access controls to limit exposure of the dagu API endpoint. Monitor logs for suspicious DAG creation requests containing path traversal patterns. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous file writes or process executions originating from dagu. Conduct regular audits of DAG files and configuration files to detect unauthorized modifications. Consider running dagu with least privilege, ensuring the process has minimal filesystem permissions to limit the impact of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T19:43:14.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699e48bfb7ef31ef0b85c3ec
Added to database: 2/25/2026, 12:56:31 AM
Last enriched: 2/25/2026, 1:10:46 AM
Last updated: 2/25/2026, 3:19:41 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3146: NULL Pointer Dereference in libvips
MediumCVE-2026-3145: Memory Corruption in libvips
MediumCVE-2026-27628: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in py-pdf pypdf
LowCVE-2026-27621: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in TypiCMS Core
MediumCVE-2026-27615: CWE-40: Path Traversal: 'UNCsharename' (Windows UNC Share) in Alex4SSB ADB-Explorer
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.