Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-66626

Опубликовано: 09 дек. 2025
Источник: redhat
CVSS3: 8.3
EPSS Низкий

Описание

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions 3.6.13 and below and versions 3.7.0 through 3.7.4, contain unsafe untar code that handles symbolic links in archives. Concretely, the computation of a link's target and the subsequent check are flawed. An attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which would be executed at the pod's start. The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links. This issue is fixed in versions 3.6.14 and 3.7.5.

A path traversal and arbitrary file overwrite vulnerability has been identified in Argo Workflows during the extraction of archived artifacts, where symbolic links inside a crafted archive are not safely validated before file extraction. An attacker could exploit this flaw by submitting a malicious archive containing symbolic links that point outside the intended extraction directory, causing files to be written or overwritten in unintended locations within the workflow pod. Successful exploitation may allow an attacker to overwrite execution control files and achieve arbitrary command execution during pod startup.

Отчет

Red Hat Product Security has rated this issue as High severity (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H, 8.3) because an attacker with basic workflow submission privileges can supply a specially crafted archive that is automatically extracted without proper validation. The attack complexity is low and does not require user interaction once the malicious workflow is submitted. Successful exploitation allows arbitrary file overwrite within the affected pod, including critical execution files, which can result in code execution at pod startup. While the impact is generally limited to the compromised pod and does not directly lead to host-level compromise, the integrity and availability impacts within the container are significant, justifying a High severity rating.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-api-server-v2-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-driver-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-launcher-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8Not affected
Red Hat OpenShift AI 2.16rhoai/odh-data-science-pipelines-argo-argoexec-rhel8FixedRHSA-2026:580725.03.2026
Red Hat OpenShift AI 2.16rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8FixedRHSA-2026:580725.03.2026
Red Hat OpenShift AI 2.25rhoai/odh-data-science-pipelines-argo-argoexec-rhel9FixedRHSA-2026:210605.02.2026
Red Hat OpenShift AI 2.25rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel9FixedRHSA-2026:210605.02.2026
Red Hat OpenShift AI 2.25rhoai/odh-ml-pipelines-api-server-v2-rhel9FixedRHSA-2026:210605.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-73
https://bugzilla.redhat.com/show_bug.cgi?id=2420818github.com/argoproj/argo-workflows: argoproj/argo-workflows is vulnerable to RCE via ZipSlip and symbolic links

EPSS

Процентиль: 26%
0.00091
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
4 месяца назад

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions 3.6.13 and below and versions 3.7.0 through 3.7.4, contain unsafe untar code that handles symbolic links in archives. Concretely, the computation of a link's target and the subsequent check are flawed. An attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which would be executed at the pod's start. The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links. This issue is fixed in versions 3.6.14 and 3.7.5.

CVSS3: 8.1
github
4 месяца назад

RCE via ZipSlip and symbolic links in argoproj/argo-workflows

EPSS

Процентиль: 26%
0.00091
Низкий

8.3 High

CVSS3