Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-31892

Опубликовано: 11 мар. 2026
Источник: nvd
CVSS3: 8.1
EPSS Низкий

Описание

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 2.9.0 to before 4.0.2 and 3.7.11, A user who can submit Workflows can completely bypass all security settings defined in a WorkflowTemplate by including a podSpecPatch field in their Workflow submission. This works even when the controller is configured with templateReferencing: Strict, which is specifically documented as a mechanism to restrict users to admin-approved templates. The podSpecPatch field on a submitted Workflow takes precedence over the referenced WorkflowTemplate during spec merging and is applied directly to the pod spec at creation time with no security validation. This vulnerability is fixed in 4.0.2 and 3.7.11.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:argoproj:argo_workflows:*:*:*:*:*:go:*:*
Версия от 2.9.0 (включая) до 3.7.11 (исключая)
cpe:2.3:a:argoproj:argo_workflows:*:*:*:*:*:go:*:*
Версия от 4.0.0 (включая) до 4.0.2 (исключая)

EPSS

Процентиль: 10%
0.00035
Низкий

8.1 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 9.9
redhat
16 дней назад

A flaw was found in Argo Workflows. A user with privileges to submit workflows can bypass security settings defined in a WorkflowTemplate by including a `podSpecPatch` field in their workflow submission. This allows them to circumvent restrictions, even when `templateReferencing: Strict` is configured, potentially leading to unauthorized resource access or privilege escalation.

github
16 дней назад

Argo Workflows: WorkflowTemplate Security Bypass via podSpecPatch in Strict/Secure Reference Mode

EPSS

Процентиль: 10%
0.00035
Низкий

8.1 High

CVSS3

Дефекты

CWE-863