CVE-2026-31886
HIGH WAF: HighDagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, the dagRunId request field accepted by the inline DAG execution endpoints is passed directly into filepath.Join to construct a temporary directory path without any format validation. Go's filepath.Join resolves .. segments lexically, so a caller can supply a value such as ".." to redirect the computed directory outside the intended /tmp/
WAF Coverage Analysis
OWASP: A01:2021 Broken Access Control
Affected Software
| Vendor | Product | Version |
|---|---|---|
| dagu | dagu | up to 2.2.4 |
References
- github.com (Patch)
- github.com (Exploit, Mitigation, Vendor Advisory)