Ad

CVE-2026-27598

HIGH CVSS 4.0: 7.1 EPSS 0.08%
Updated Feb 25, 2026
Dagu
Parameter Value
CVSS 7.1 (HIGH)
Affected Versions before 1.16.7
Type CWE-22 (Path Traversal)
Vendor Dagu
Public PoC No

Dagu is a workflow engine with a built-in Web user interface. In versions up to and including 1.16.7, the `CreateNewDAG` API endpoint (`POST /api/v1/dags`) does not validate the DAG name before passing it to the file store. An authenticated user with DAG write permissions can write arbitrary YAML files anywhere on the filesystem (limited by the process permissions).

Since dagu executes DAG files as shell commands, writing a malicious DAG to the DAGs directory of another instance or overwriting config files can lead to remote code execution. Commit e2ed589105d79273e4e6ac8eb31525f765bb3ce4 fixes the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 1

dagu:dagu

Known Affected Software Configurations 1

Configuration From (including) Up to (excluding)
Dagu Dagu
cpe:2.3:a:dagu:dagu:*:*:*:*:*:*:*:*
<= 1.16.7