Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-55gc-6fmc-fpx9 | Hatchet affected by cross-tenant information disclosure in `listTasksByDAGIds` |
Fri, 15 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hatchet-dev
Hatchet-dev hatchet |
|
| Vendors & Products |
Hatchet-dev
Hatchet-dev hatchet |
Thu, 14 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hatchet is a platform for orchestrating background tasks, AI agents, and durable workflows at scale. Prior to 0.83.39, a missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belonging to that tenant, and receive task metadata for that DAG. This vulnerability is fixed in 0.83.39. | |
| Title | Hatchet: Cross-tenant information disclosure in `listTasksByDAGIds` | |
| Weaknesses | CWE-639 CWE-863 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T18:05:26.585Z
Reserved: 2026-04-28T17:26:12.084Z
Link: CVE-2026-42572
Updated: 2026-05-15T16:44:51.429Z
Status : Awaiting Analysis
Published: 2026-05-14T18:16:47.943
Modified: 2026-05-14T18:26:39.827
Link: CVE-2026-42572
No data.
OpenCVE Enrichment
Updated: 2026-05-15T11:21:09Z
Github GHSA