Argo Workflows

2 CVEs product

Monthly

CVE-2026-31892 HIGH PATCH This Week

Argo Workflows versions 2.9.0 through 4.0.1 (and 3.x before 3.7.11) allow authenticated users to bypass WorkflowTemplate security policies by injecting a podSpecPatch field in workflow submissions, circumventing even strict template referencing controls. An attacker with workflow submission privileges can exploit this to modify pod specifications without security validation, potentially gaining unauthorized access or executing arbitrary code. This vulnerability affects organizations using Kubernetes with Argo Workflows and requires upgrading to versions 4.0.2, 3.7.11 or later to remediate.

Kubernetes Authentication Bypass Argo Workflows
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-23960 MEDIUM POC PATCH This Month

Stored XSS in Argo Workflows artifact directory listing (versions prior to 3.6.17 and 3.7.8) allows workflow authors to inject malicious JavaScript that executes in other users' browsers under the Argo Server origin. An attacker can leverage the victim's session to perform API actions and access resources with their privileges. Public exploit code exists for this vulnerability; patched versions are available.

Golang Kubernetes XSS Argo Workflows Redhat +1
NVD GitHub
CVSS 3.1
5.4
EPSS
0.1%
CVE-2026-31892
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Argo Workflows versions 2.9.0 through 4.0.1 (and 3.x before 3.7.11) allow authenticated users to bypass WorkflowTemplate security policies by injecting a podSpecPatch field in workflow submissions, circumventing even strict template referencing controls. An attacker with workflow submission privileges can exploit this to modify pod specifications without security validation, potentially gaining unauthorized access or executing arbitrary code. This vulnerability affects organizations using Kubernetes with Argo Workflows and requires upgrading to versions 4.0.2, 3.7.11 or later to remediate.

Kubernetes Authentication Bypass Argo Workflows
NVD GitHub VulDB
CVE-2026-23960
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

Stored XSS in Argo Workflows artifact directory listing (versions prior to 3.6.17 and 3.7.8) allows workflow authors to inject malicious JavaScript that executes in other users' browsers under the Argo Server origin. An attacker can leverage the victim's session to perform API actions and access resources with their privileges. Public exploit code exists for this vulnerability; patched versions are available.

Golang Kubernetes XSS +3
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy