A missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belonging to that tenant, and receive task metadata for that DAG.
This issue has been patched in v0.83.39. Hatchet Cloud has been patched and requires no action from users. Self-hosted users should upgrade.
Who is affected. Multi-tenant Hatchet instances reachable by an attacker who can obtain an account on that instance. On Hatchet Cloud, account creation is open by default. On self-hosted instances, the API must be reachable by the attacker and the hostname known; instances deployed inside a VPC or with signup restricted are not exposed to arbitrary external actors.
Prerequisites for exploitation. An attacker needed:
external_id) belonging to that tenant.The two UUIDs are not treated as secrets — they appear in URLs, API responses, audit logs, invitation flows, shared run links, and dashboard screenshots — but an attacker does need to learn them through some out-of-band channel before exploitation is possible.
What could be disclosed. For each child task of a targeted DAG, the endpoint returned:
display_name, action_id, step_idworkflow_id, workflow_version_id, workflow_run_id, task_external_idtenant_id, retry_count, status, timestampsadditional_metadata (JSON)The additional_metadata field is the most sensitive: Hatchet workflows commonly use it to carry domain context such as user identifiers, customer IDs, feature flags, or correlation tokens. Its contents vary by deployment.
What was not disclosed. The raw task input payload is not part of this endpoint's response shape and was not exposed through this issue. The scope is limited to task metadata, not task arguments or results.
Exploitation status. We have no evidence that this vulnerability was exploited prior to the patch.
Hatchet's multi-tenant authorization relies on an OpenAPI-driven middleware pipeline. Each authenticated operation declares x-resources: ["tenant", ...] in its spec. The populator middleware reads the declared resources, looks up the corresponding entities from request parameters, and stores them on the request context. The authz middleware then verifies that the authenticated user is a member of the tenant found on the context.
The listTasksByDAGIds operation accepted a tenant UUID as a query parameter, but its OpenAPI definition did not declare x-resources: ["tenant"]. As a result:
The SQL query itself correctly filters by tenant_id, so it returned only rows matching the supplied UUID — but the UUID came from the caller rather than from an authorization-validated context, so the filter bounded the response to the attacker-named tenant rather than to a tenant the caller was authorized to read.
Every other authenticated operation in the same path file (tasks.yaml) correctly declared x-resources. This endpoint was the only authenticated operation in the file that did not.
The fix adds the missing resource authz checks inline on the handler, enforcing valid tenant membership before the handler runs.
Shipped in v0.83.39.
Hatchet Cloud. No action required. The patch was deployed on April 23, 2026 within the same day it was reported.
Self-hosted — recommended. Upgrade to v0.83.39 or later.
Self-hosted — if you cannot upgrade immediately. Either of the following reduces exposure until you can upgrade:
SERVER_AUTH_RESTRICTED_EMAIL_DOMAINS to an allowlist of domains you control. This prevents arbitrary users from registering an account on your instance, which removes the most common path to the prerequisite account.All times April 23, 2026.
Reported by @sajdakabir.
Hatchet thanks the reporter for responsibly disclosing this issue and for the clear, reproducible writeup.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-06T21:59:05Z",
"cwe_ids": [
"CWE-639",
"CWE-863"
],
"severity": "MODERATE",
"nvd_published_at": null
}