Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-31886 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Path Traversal vulnerability in **dagu** (Dagu Workflow Engine).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. <br>πŸ” **Flaw**: The `dagRunId` request field is passed directly to `filepath.Join` **without format validation**.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: dagu-org. <br>πŸ“‰ **Affected**: **dagu** versions **prior to 2.2.4**. <br>⚠️ If you are running v2.2.3 or earlier, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Capabilities**: <br>1. **Read**: Access arbitrary files on the system. <br>2. **Write/Delete**: Delete arbitrary files. <br>3. **Impact**: Cause **Denial of Service** by deleting critical workflow or system files.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Threshold**: **Low**. <br>πŸ“ **Auth Required**: **Yes** (PR:L - Privileges Required: Low). <br>🌐 **Vector**: Network (AV:N). <br>πŸ‘€ **UI**: None (UI:N). <br>⚑ **Complexity**: Low (AC:L).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. <br>πŸ“„ **PoCs**: None listed in the data. <br>πŸ”’ **Status**: No wild exploitation reported yet, but the flaw is straightforward.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Check your **dagu version**. Is it < 2.2.4? <br>2. Inspect code for `filepath.Join` usage with `dagRunId`. <br>3. Look for missing input validation/sanitization on workflow run IDs.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. <br>πŸ”§ **Patch**: Upgrade to **dagu v2.2.4** or later. <br>πŸ”— **Commit**: See GitHub commit `12c2e5395bd9331d49ca103593edfd0db39c4f38`.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround (If no patch)**: <br>1. **Input Sanitization**: Manually validate `dagRunId` to ensure it contains only safe characters (alphanumeric, no `../`). <br>2.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. <br>πŸ“Š **CVSS**: **7.5** (High). <br>⚑ **Priority**: Patch immediately. The ability to **delete files** and cause **DoS** makes this critical for operational stability. Don't wait!