Description
Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the {fileName} URL path parameter to locateDAG without calling ValidateDAGName. %2F-encoded forward slashes in the {fileName} segment traverse outside the DAGs directory. This issue has been patched in version 2.3.1.
Published: 2026-03-24
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Path traversal via encoded slashes allowing unauthorized file access
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises because Dagu’s API endpoints for getting, deleting, renaming, and executing DAGs pass the {fileName} URL path parameter directly to the locateDAG function without validating the name. When a user supplies a %2F-encoded forward slash in this segment, the path resolution can step outside the intended DAGs directory. This flaw permits an attacker to read or manipulate files that are stored outside the DAG workspace, potentially exposing sensitive data or enabling further compromise. The weakness is clearly a path traversal flaw, classified as CWE-22, which directly compromises the confidentiality and integrity of the underlying file system. The impact can be significant, especially if the application runs with elevated privileges or if critical configuration files are reachable.

Affected Systems

The affected product is Dagu, a workflow engine with a web interface, provided by the vendor dagu-org. Versions from 2.0.0 up to, but not including, 2.3.1 are vulnerable. Version 2.3.1 and later include a fix that ensures the file name is validated before use.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity, while the EPSS score of less than 1% suggests exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, via the exposed HTTP API, as the flaw is triggered by passing a specially crafted URL segment. An attacker can exploit this by constructing a URL that contains %2F-encoded slashes to traverse directories and access unauthorized files on the server.

Generated by OpenCVE AI on March 26, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patch or upgrade to Dagu version 2.3.1 or later

Generated by OpenCVE AI on March 26, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ph8x-4jfv-v9v8 Dagu has an incomplete fix for CVE-2026-27598: path traversal via %2F-encoded slashes in locateDAG
History

Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Dagu
Dagu dagu
CPEs cpe:2.3:a:dagu:dagu:*:*:*:*:*:*:*:*
Vendors & Products Dagu
Dagu dagu

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Dagu-org
Dagu-org dagu
Vendors & Products Dagu-org
Dagu-org dagu

Tue, 24 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the {fileName} URL path parameter to locateDAG without calling ValidateDAGName. %2F-encoded forward slashes in the {fileName} segment traverse outside the DAGs directory. This issue has been patched in version 2.3.1.
Title Dagu has an incomplete fix for CVE-2026-27598: path traversal via %2F-encoded slashes in locateDAG
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T19:57:38.816Z

Reserved: 2026-03-18T22:15:11.813Z

Link: CVE-2026-33344

cve-icon Vulnrichment

Updated: 2026-03-24T19:57:31.699Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T20:16:28.910

Modified: 2026-03-26T13:03:13.500

Link: CVE-2026-33344

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:20:36Z

Weaknesses