CVE-2026-31882: Dagu: SSE Authentication Bypass in Basic Auth Mode
(updated )
When Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API.
References
- github.com/advisories/GHSA-9wmw-9wph-2vwp
- github.com/dagu-org/dagu
- github.com/dagu-org/dagu/commit/064616c9b80c04824c1c7c357308f77f3f24d775
- github.com/dagu-org/dagu/pull/1752
- github.com/dagu-org/dagu/releases/tag/v2.2.4
- github.com/dagu-org/dagu/security/advisories/GHSA-9wmw-9wph-2vwp
- nvd.nist.gov/vuln/detail/CVE-2026-31882
Code Behaviors & Features
Detect and mitigate CVE-2026-31882 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →