CVE-2026-33344

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the {fileName} URL path parameter to locateDAG without calling ValidateDAGName. %2F-encoded forward slashes in the {fileName} segment traverse outside the DAGs directory. This issue has been patched in version 2.3.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dagu:dagu:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-24 20:16

Updated : 2026-03-26 13:03


NVD link : CVE-2026-33344

Mitre link : CVE-2026-33344

CVE.ORG link : CVE-2026-33344


JSON object : View

Products Affected

dagu

  • dagu
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')