Cyber Posture

CVE-2026-31882

HighPublic PoC

Published: 13 March 2026

Published
13 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0016 36.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31882 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Dagu Dagu. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authentication on public-facing web UI/SSE endpoints in Dagu directly enables remote exploitation of the application without credentials, matching T1190 for initial unauthorized access to sensitive workflow data.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time…

more

DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API. The buildStreamAuthOptions() function builds authentication options for SSE/streaming endpoints. When the auth mode is basic, it returns an auth.Options struct with BasicAuthEnabled: true but AuthRequired defaults to false (Go zero value). The authentication middleware at internal/service/frontend/auth/middleware.go allows unauthenticated requests when AuthRequired is false. This vulnerability is fixed in 2.2.4.

Deeper analysisAI

CVE-2026-31882 is a missing authentication vulnerability (CWE-306) in Dagu, an open-source workflow engine featuring a built-in web user interface. In versions prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints remain accessible without credentials. This issue stems from the buildStreamAuthOptions() function, which sets BasicAuthEnabled to true for SSE/streaming endpoints but defaults AuthRequired to false (the Go zero value). As a result, the authentication middleware in internal/service/frontend/auth/middleware.go permits unauthenticated requests, bypassing protections applied to the REST API.

Network-accessible unauthenticated attackers can exploit this vulnerability with low complexity and no privileges or user interaction required. Successful exploitation grants access to sensitive real-time data, including DAG execution details, workflow configurations, execution logs, and queue status. The CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) underscores the high confidentiality impact without affecting integrity or availability.

Dagu addressed this vulnerability in version 2.2.4. Security practitioners should upgrade affected deployments immediately. Key resources include the fixing commit (https://github.com/dagu-org/dagu/commit/064616c9b80c04824c1c7c357308f77f3f24d775), pull request (https://github.com/dagu-org/dagu/pull/1752), release notes (https://github.com/dagu-org/dagu/releases/tag/v2.2.4), and GitHub security advisory (https://github.com/dagu-org/dagu/security/advisories/GHSA-9wmw-9wph-2vwp).

Details

CWE(s)

Affected Products

dagu
dagu
≤ 2.2.4

CVEs Like This One

CVE-2026-33344Same product: Dagu Dagu
CVE-2026-31886Same product: Dagu Dagu
CVE-2026-1453Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306
CVE-2025-0355Shared CWE-306
CVE-2026-24177Shared CWE-306

References