BIT-argo-workflows-2026-28229

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/argo-workflows/BIT-argo-workflows-2026-28229.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-argo-workflows-2026-28229
Aliases
Published
2026-03-13T09:01:11.473Z
Modified
2026-03-23T04:56:21.457023511Z
Summary
Argo Workflows has unauthorized access to Argo Workflows Template
Details

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests. This vulnerability is fixed in 4.0.2 and 3.7.11.

Database specific
{
    "cpes": [
        "cpe:2.3:a:argo_workflows_project:argo_workflows:*:*:*:*:*:kubernetes:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / argo-workflows

Package

Name
argo-workflows
Purl
pkg:bitnami/argo-workflows

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.11
Introduced
4.0.0
Fixed
4.0.2

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/argo-workflows/BIT-argo-workflows-2026-28229.json"