Vulnerability Details CVE-2026-24124
Dragonfly is an open source P2P-based file distribution and image acceleration system. In versions 2.4.1-rc.0 and below, the Job API endpoints (/api/v1/jobs) lack JWT authentication middleware and RBAC authorization checks in the routing configuration. This allows any unauthenticated user with access to the Manager API to view, update and delete jobs. The issue is fixed in version 2.4.1-rc.1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 23.1%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2026-24124
-
cpe:2.3:a:linuxfoundation:dragonfly:-
-
cpe:2.3:a:linuxfoundation:dragonfly:0.1.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.2.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.3.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.4.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.5.0
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.0
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.1
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.10
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.2
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.3
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.4
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.5
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.6
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.7
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.8
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.9
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.0
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.1
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.10
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.11
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.12
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.13
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.14
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.15
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.16
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.17
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.18
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.19
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.2
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.20
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.21
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.22
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.23
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.24
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.25
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.26
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.27
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.28
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.29
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.3
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.30
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.31
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.32
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.33
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.34
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.35
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.36
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.37
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.38
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.39
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.4
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.40
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.41
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.42
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.43
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.44
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.45
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.46
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.47
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.48
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.49
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.5
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.50
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.51
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.52
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.53
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.54
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.55
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.56
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.57
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.58
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.6
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.7
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.8
-
cpe:2.3:a:linuxfoundation:dragonfly:2.1.9
-
cpe:2.3:a:linuxfoundation:dragonfly:2.4.1