BIT-argo-cd-2025-59537

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/argo-cd/BIT-argo-cd-2025-59537.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-argo-cd-2025-59537
Aliases
Published
2025-10-06T08:54:09.813Z
Modified
2025-10-06T09:42:19.768493Z
Summary
argo-cd is vulnerable to unauthenticated DoS attack via malformed Gogs webhook payload
Details

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Versions 1.2.0 through 1.8.7, 2.0.0-rc1 through 2.14.19, 3.0.0-rc1 through 3.2.0-rc1, 3.1.7 and 3.0.18 are vulnerable to malicious API requests which can crash the API server and cause denial of service to legitimate clients. With the default configuration, no webhook.gogs.secret set, Argo CD’s /api/webhook endpoint will crash the entire argocd-server process when it receives a Gogs push event whose JSON field commits[].repo is not set or is null. This issue is fixed in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19.

Database specific
{
    "severity": "High",
    "cpes": [
        "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*"
    ]
}
References

Affected packages

Bitnami / argo-cd

Package

Name
argo-cd
Purl
pkg:bitnami/argo-cd

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
1.2.0
Fixed
2.14.20
Introduced
3.0.0
Fixed
3.0.19
Introduced
3.1.0
Fixed
3.1.8