Human
Machine
REPRO-2026-00106 CRITICAL RCE
Verified
Dagu Unauthenticated RCE via Inline DAG Spec
github.com/dagu-org/dagu (go) Feb 20, 2026
What's the vulnerability?
Dagu's default configuration ships with authentication completely disabled. The POST /api/v2/dag-runs endpoint accepts an inline YAML spec and executes shell commands immediately without authentication.
Root Cause Analysis
One Command
Verify with pruva-verify
Run the Pruva CLI to automatically fetch and execute the reproduction script.
pruva-verify REPRO-2026-00106 or
pruva-verify GHSA-6qr9-g2xw-cw92 Install:
curl -fsSL https://pruva.dev/install.sh | sh Or Run Manually
1
Download the script
curl -O https://pruva.dev/api/v1/reproductions/REPRO-2026-00106/artifacts/repro/reproduction_steps.sh 2
Make executable
chmod +x reproduction_steps.sh 3
Run the script
./reproduction_steps.sh Run in a VM, container, or disposable environment. This exploits a real vulnerability.
How Pruva Reproduced This
Watch the AI agent's step-by-step process.
Loading session...
Artifacts
repro/rca_report.md6.3 KBrepro/reproduction_steps.sh4.0 KBbundle/source.json6.1 KBbundle/ticket.json10.6 KBbundle/ticket.md4.1 KBlogs/dagu_fixed_server.log0.2 KBlogs/dagu_server.log1.5 KBlogs/dagu_variant_server.log2.3 KBlogs/docker_run.log0.2 KBlogs/exploit_response.log0.1 KBlogs/final_server.log1.4 KBlogs/variant_test.log0.2 KBlogs/verification.log0.0 KB