
GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)
Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92) Vulnerability ID: GHSA-6QR9-G2XW-CW92 CVSS Score: 9.8 Published: 2026-02-19 Dagu, a lightweight Go-based workflow engine often used as a cron alternative, inadvertently provided 'RCE as a Service' in its default configuration. By failing to enforce authentication on API endpoints that accept inline DAG definitions, it allowed any unauthenticated attacker to execute arbitrary shell commands on the host server via simple HTTP requests. TL;DR Critical RCE in Dagu workflow engine. Default configuration exposes API endpoints without auth. Attackers can POST a YAML file to execute arbitrary shell commands. ⚠️ Exploit Status: POC Technical Details CWE ID : CWE-306 Attack Vector : Network CVSS : 9.8 (Critical) Impact : Remote Code Execution Exploit Status : Functional PoC Authentication : None Required (Default) Affected Systems Dagu Workflow Engine Go-based DevOps tooling Dagu : < Feb 2026 Patch (Fixed in: Feb 2026 Release
Continue reading on Dev.to
Opens in a new tab




