Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31882: CWE-306: Missing Authentication for Critical Function in dagu-org dagu

0
High
VulnerabilityCVE-2026-31882cvecve-2026-31882cwe-306
Published: Fri Mar 13 2026 (03/13/2026, 19:28:25 UTC)
Source: CVE Database V5
Vendor/Project: dagu-org
Product: dagu

Description

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API. The buildStreamAuthOptions() function builds authentication options for SSE/streaming endpoints. When the auth mode is basic, it returns an auth.Options struct with BasicAuthEnabled: true but AuthRequired defaults to false (Go zero value). The authentication middleware at internal/service/frontend/auth/middleware.go allows unauthenticated requests when AuthRequired is false. This vulnerability is fixed in 2.2.4.

AI-Powered Analysis

AILast updated: 03/13/2026, 19:59:19 UTC

Technical Analysis

The vulnerability CVE-2026-31882 affects dagu-org's 'dagu' workflow engine prior to version 2.2.4. Dagu provides a web-based interface and supports HTTP Basic authentication to protect its REST API endpoints. However, the Server-Sent Events (SSE) endpoints, which stream real-time workflow execution data, were not properly secured. Specifically, the function buildStreamAuthOptions() sets BasicAuthEnabled to true but leaves AuthRequired as false (the Go language zero value). The authentication middleware checks AuthRequired and allows unauthenticated requests if it is false. Consequently, attackers can access SSE endpoints without credentials, bypassing authentication. This grants access to sensitive information such as live DAG execution data, workflow configurations, execution logs, and queue status. The vulnerability stems from a logic flaw in the authentication middleware and configuration handling for SSE endpoints. It does not affect other REST API endpoints protected by Basic authentication. The issue was addressed in version 2.2.4 by ensuring that SSE endpoints require authentication when Basic auth mode is enabled. The CVSS v3.1 score is 7.5 (high), reflecting the ease of remote exploitation without privileges or user interaction and the high confidentiality impact. No known exploits are reported in the wild yet.

Potential Impact

This vulnerability allows unauthenticated attackers to bypass authentication controls and access sensitive real-time operational data of workflows managed by dagu. Exposure of DAG execution data, workflow configurations, logs, and queue status can lead to significant information disclosure, enabling attackers to understand internal processes, identify potential weaknesses, or prepare further targeted attacks. Although the vulnerability does not allow modification or disruption of services, the confidentiality breach can compromise organizational security posture, especially in environments where workflows handle sensitive or critical operations. Organizations relying on dagu for workflow automation may face risks of intellectual property theft, operational insight leakage, or compliance violations. The impact is amplified in sectors where workflow data is sensitive, such as finance, healthcare, or critical infrastructure. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad for exposed instances.

Mitigation Recommendations

The primary mitigation is to upgrade dagu to version 2.2.4 or later, where the authentication enforcement on SSE endpoints is corrected. Until upgrade is possible, organizations should consider the following specific measures: 1) Restrict network access to dagu instances by limiting exposure of SSE endpoints through firewall rules or network segmentation, allowing only trusted internal users. 2) Disable HTTP Basic authentication mode if feasible, or switch to more secure authentication mechanisms supported by dagu. 3) Monitor network traffic for unauthorized access attempts to SSE endpoints and audit logs for unusual activity. 4) Implement web application firewalls (WAFs) with rules to detect and block unauthenticated SSE endpoint access patterns. 5) Review and minimize sensitive data exposed via SSE streams to reduce impact if accessed. 6) Conduct security assessments to identify any exploitation attempts and validate that no further vulnerabilities exist in the deployment. These targeted mitigations complement the essential patching step to fully remediate the risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T21:59:02.686Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b469392f860ef94390568c

Added to database: 3/13/2026, 7:44:57 PM

Last enriched: 3/13/2026, 7:59:19 PM

Last updated: 3/13/2026, 10:24:19 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses