CVE-2026-31886: Dagu
CVE-2026-31886
Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, the dagRunId request field accepted by the inline DAG execution endpoints is passed directly into filepath.Join to constru...
Overview
A critical security vulnerability, tracked as CVE-2026-31886, has been discovered in the Dagu workflow engine. This flaw allows an attacker to delete critical system files, potentially causing a complete denial of service. Dagu is an open-source tool with a built-in web interface for automating workflows.
Vulnerability Explained
In simple terms, this is a path traversal vulnerability. Dagu versions before 2.2.4 have a specific web endpoint used for running workflows. This endpoint uses a user-supplied input field (dagRunId) to help create a temporary directory on the server’s filesystem.
The vulnerability exists because this input is not checked or sanitized. An attacker can submit a value like .. (two dots), which is a standard command to move “up” one level in a directory structure. When the system processes this, it is tricked into placing files outside its intended safe location. Worse, a cleanup function then automatically deletes this incorrectly calculated directory and everything inside it.
Potential Impact
The impact of this flaw is severe and depends on how Dagu is installed:
- Non-root deployments: The attack can delete all temporary files in
/tmpowned by the Dagu process user. This disrupts all concurrent Dagu operations, halting workflows and causing data loss. - Root or Docker deployments: The attack can delete the entire contents of the system’s
/tmpdirectory. This is a critical system folder used by the operating system and many other applications. Deleting it causes immediate, widespread system instability and a full denial of service, potentially crashing the server.
This makes the vulnerability especially dangerous in containerized environments or default installations. For context on how such flaws can lead to major incidents, recent cybersecurity news at security news often covers similar exploitation events.
Remediation and Mitigation
Immediate action is required to protect your systems.
Primary Fix: The only complete solution is to upgrade Dagu to version 2.2.4 or later. This version contains the necessary validation to prevent the path traversal. Users should update their installations without delay.
Temporary Mitigation: If immediate upgrading is not possible, consider the following steps to reduce risk:
- Restrict Network Access: Ensure the Dagu web interface is not exposed to the public internet. Limit access to only trusted, necessary networks.
- Review Permissions: Run the Dagu service under a dedicated, non-root user with minimal filesystem permissions. While this won’t prevent the attack in non-root deployments, it can limit the scope of damage to user-owned files only.
- Monitor for Exploitation: Monitor system logs and
/tmpdirectory integrity for unexpected file deletion events.
Organizations should treat this as a critical patch. Failure to apply it could result in significant operational disruption. For insights into data exposures that can follow system compromises, you can review past incidents in our breach reports.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-31886?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit...
A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code exec...
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary...
Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionalit...