Argo Workflow may expose artifact repository credentials
High severity
GitHub Reviewed
Published
Oct 14, 2025
in
argoproj/argo-workflows
•
Updated Nov 5, 2025
Package
Affected versions
>= 3.7.0, < 3.7.3
< 3.6.12
Patched versions
3.7.3
3.6.12
Description
Published by the National Vulnerability Database
Oct 14, 2025
Published to the GitHub Advisory Database
Oct 14, 2025
Reviewed
Oct 14, 2025
Last updated
Nov 5, 2025
Summary
An attacker who has permissions to read logs from pods in a namespace with Argo Workflow can read
workflow-controllerlogs and get credentials to the artifact repository.Details
An attacker, by reading the logs of the workflow controller pod, can access the artifact repository, and steal, delete or modify the data that resides there. The
workflow-controllerlogs show the credentials in plaintext.Impact
An attacker with access to pod logs in the
argonamespace can extract plaintext credentials from theworkflow-controllerlogs and gain access to the artifact repository. This can lead to:References