Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9wmw-9wph-2vwp | Dagu: SSE Authentication Bypass in Basic Auth Mode |
Wed, 18 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dagu
Dagu dagu |
|
| CPEs | cpe:2.3:a:dagu:dagu:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dagu
Dagu dagu |
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dagu-org
Dagu-org dagu |
|
| Vendors & Products |
Dagu-org
Dagu-org dagu |
Fri, 13 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API. The buildStreamAuthOptions() function builds authentication options for SSE/streaming endpoints. When the auth mode is basic, it returns an auth.Options struct with BasicAuthEnabled: true but AuthRequired defaults to false (Go zero value). The authentication middleware at internal/service/frontend/auth/middleware.go allows unauthenticated requests when AuthRequired is false. This vulnerability is fixed in 2.2.4. | |
| Title | Dagu SSE Authentication Bypass in Basic Auth Mode | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-13T19:43:56.406Z
Reserved: 2026-03-09T21:59:02.686Z
Link: CVE-2026-31882
Updated: 2026-03-13T19:43:53.328Z
Status : Analyzed
Published: 2026-03-13T19:54:37.000
Modified: 2026-03-18T20:14:20.940
Link: CVE-2026-31882
No data.
OpenCVE Enrichment
Updated: 2026-03-23T13:40:12Z
Github GHSA