Description
Hatchet is a platform for orchestrating background tasks, AI agents, and durable workflows at scale. Prior to 0.83.39, a missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belonging to that tenant, and receive task metadata for that DAG. This vulnerability is fixed in 0.83.39.
Published: 2026-05-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from a missing authorization check on the GET /api/v1/stable/dags/tasks endpoint in Hatchet. An authenticated user from any tenant can supply another tenant’s UUID and a DAG UUID belonging to that tenant to retrieve task metadata for that DAG. The result is a breach of confidentiality, exposing internal details of workflows to unauthorized users. The flaw is a classic omission of an authorization directive (CWE‑639) combined with improper tenant isolation (CWE‑863). The impact is limited to data disclosure and does not involve code execution or service disruption.

Affected Systems

The flaw affects all Hatchet deployments that run a version older than 0.83.39. The product, developed by hatchet‑dev, is an orchestration platform for background tasks, AI agents, and durable workflows. Instances that support multiple tenants and expose the stable API are vulnerable. No other components or variants are mentioned in the advisory.

Risk and Exploitability

The CVSS score of 5.3 places the issue in the medium severity range. Exploitability requires only authenticated access to the Hatchet instance; no additional privileges or launch conditions are required. The EPSS score is not available, so the current probability of exploitation is unknown, but the missing authorization is a straightforward vector that could be abused with simple API requests. The vulnerability is not listed in the CISA KEV catalog, indicating no known public exploits at the time of disclosure. Nonetheless, the potential for cross‑tenant data leakage warrants prompt remediation, particularly in multi‑tenant environments.

Generated by OpenCVE AI on May 14, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Hatchet to version 0.83.39 or newer to restore the tenant‑membership check on the /api/v1/stable/dags/tasks endpoint.
  • Ensure that the /api/v1/stable/dags/tasks API validates tenant UUIDs against the requester’s membership so that only the intended tenant can query its DAGs.
  • Enable detailed logging of API calls, monitor for cross‑tenant request patterns, and audit any anomalous accesses to task metadata.

Generated by OpenCVE AI on May 14, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-55gc-6fmc-fpx9 Hatchet affected by cross-tenant information disclosure in `listTasksByDAGIds`
History

Fri, 15 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Hatchet-dev
Hatchet-dev hatchet
Vendors & Products Hatchet-dev
Hatchet-dev hatchet

Thu, 14 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Hatchet is a platform for orchestrating background tasks, AI agents, and durable workflows at scale. Prior to 0.83.39, a missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belonging to that tenant, and receive task metadata for that DAG. This vulnerability is fixed in 0.83.39.
Title Hatchet: Cross-tenant information disclosure in `listTasksByDAGIds`
Weaknesses CWE-639
CWE-863
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Hatchet-dev Hatchet
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T18:05:26.585Z

Reserved: 2026-04-28T17:26:12.084Z

Link: CVE-2026-42572

cve-icon Vulnrichment

Updated: 2026-05-15T16:44:51.429Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T18:16:47.943

Modified: 2026-05-14T18:26:39.827

Link: CVE-2026-42572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:21:09Z

Weaknesses