Use of Hard-coded Cryptographic Key in Argo Workflows - #VU126900
Published: August 18, 2021 / Updated: April 23, 2026
Argo Workflows
Argo
Description
The vulnerability allows a remote attacker to forge requests or disclose sensitive information.
The vulnerability exists due to improper certificate validation in Argo Server TLS handling when establishing secure connections. A remote attacker can extract the packaged keys and use them to forge requests or disclose sensitive information.
The issue affects deployments running Argo Server in secure mode, and exposure to the Internet makes the attack reachable from the Internet.