Improper access control in Argo Workflows - #VU126903
Published: July 22, 2021 / Updated: April 23, 2026
Argo Workflows
Argo
Description
The vulnerability allows a remote user to execute arbitrary code on the Kubernetes cluster.
The vulnerability exists due to improper access control in Argo Server when the user interface is exposed to the internet while using --auth-mode=server. A remote user can access the exposed interface to execute arbitrary code on the Kubernetes cluster.
Only deployments using Argo Server with --auth-mode=server and an internet-exposed UI are vulnerable.