Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API. The buildStreamAuthOptions() function builds authentication options for SSE/streaming endpoints. When the auth mode is basic, it returns an auth.Options struct with BasicAuthEnabled: true but AuthRequired defaults to false (Go zero value). The authentication middleware at internal/service/frontend/auth/middleware.go allows unauthenticated requests when AuthRequired is false. This vulnerability is fixed in 2.2.4.
References
| Link | Resource |
|---|---|
| https://github.com/dagu-org/dagu/commit/064616c9b80c04824c1c7c357308f77f3f24d775 | Patch |
| https://github.com/dagu-org/dagu/pull/1752 | Issue Tracking Patch |
| https://github.com/dagu-org/dagu/releases/tag/v2.2.4 | Product Release Notes |
| https://github.com/dagu-org/dagu/security/advisories/GHSA-9wmw-9wph-2vwp | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-13 19:54
Updated : 2026-03-18 20:14
NVD link : CVE-2026-31882
Mitre link : CVE-2026-31882
CVE.ORG link : CVE-2026-31882
JSON object : View
Products Affected
dagu
- dagu
CWE
CWE-306
Missing Authentication for Critical Function
