Improper access control in Argo Workflows - #VU126901

 

Improper access control in Argo Workflows - #VU126901

Published: August 18, 2021 / Updated: April 23, 2026


Vulnerability identifier: #VU126901
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Argo Workflows
Software vendor:
Argo

Description

The vulnerability allows a remote user to escalate privileges.

The vulnerability exists due to improper access control in Argo Server authentication handling when processing client-authenticated requests with --auth-mode=client. A remote user can connect using a client key to escalate privileges.

Exploitation requires Kubernetes version 1.19 or later, Argo Server running outside a Kubernetes pod, --auth-mode=server not being configured, and the server account having more permissions than the connecting user's account.


Remediation

Install security update from vendor's website.

External links