Authorization Bypass in Hatchet Platform for Background Task Management
CVE-2026-42572

5.3MEDIUM

Key Information:

Status
Vendor
CVE Published:
14 May 2026

What is CVE-2026-42572?

The Hatchet platform, which orchestrates background tasks, AI agents, and durable workflows, contains a critical issue related to authorization. Prior to version 0.83.39, a missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint allowed authenticated users to bypass tenant membership checks. This flaw enabled attackers to retrieve task metadata from another tenant's DAG using just their UUID, leading to potential data exposure and privacy violations. The issue has been resolved in version 0.83.39, and users are urged to upgrade to this version to mitigate the risk.

Affected Version(s)

hatchet < 0.83.38

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.