Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the {fileName} URL path parameter to locateDAG without calling ValidateDAGName. %2F-encoded forward slashes in the {fileName} segment traverse outside the DAGs directory. This issue has been patched in version 2.3.1.
References
| Link | Resource |
|---|---|
| https://github.com/dagu-org/dagu/commit/7d07fda8f9de3ae73dfb081ccd0639f8059c56bb | Patch |
| https://github.com/dagu-org/dagu/security/advisories/GHSA-ph8x-4jfv-v9v8 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 20:16
Updated : 2026-03-26 13:03
NVD link : CVE-2026-33344
Mitre link : CVE-2026-33344
CVE.ORG link : CVE-2026-33344
JSON object : View
Products Affected
dagu
- dagu
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
