Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-31892

Опубликовано: 11 мар. 2026
Источник: redhat
CVSS3: 9.9

Описание

A flaw was found in Argo Workflows. A user with privileges to submit workflows can bypass security settings defined in a WorkflowTemplate by including a podSpecPatch field in their workflow submission. This allows them to circumvent restrictions, even when templateReferencing: Strict is configured, potentially leading to unauthorized resource access or privilege escalation.

Отчет

This IMPORTANT vulnerability affects Red Hat OpenShift AI through its use of Argo Workflows. A user with low privileges can bypass WorkflowTemplate security controls by submitting workflows with a podSpecPatch field that overrides template definitions. The scope is changed as attackers can manipulate pod specifications beyond their intended access, resulting in high impact to confidentiality, integrity, and availability. Affects versions 2.9.0 through 4.0.1 and 3.7.10.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift AI (RHOAI)rhoai/odh-data-science-pipelines-argo-argoexec-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-api-server-v2-rhel8Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-api-server-v2-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-driver-rhel8Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-driver-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-launcher-rhel8Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-launcher-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-persistenceagent-v2-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-807
https://bugzilla.redhat.com/show_bug.cgi?id=2446551github.com/argoproj/argo-workflows: Argo Workflows: Security bypass allows privilege escalation via podSpecPatch field

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
16 дней назад

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 2.9.0 to before 4.0.2 and 3.7.11, A user who can submit Workflows can completely bypass all security settings defined in a WorkflowTemplate by including a podSpecPatch field in their Workflow submission. This works even when the controller is configured with templateReferencing: Strict, which is specifically documented as a mechanism to restrict users to admin-approved templates. The podSpecPatch field on a submitted Workflow takes precedence over the referenced WorkflowTemplate during spec merging and is applied directly to the pod spec at creation time with no security validation. This vulnerability is fixed in 4.0.2 and 3.7.11.

github
16 дней назад

Argo Workflows: WorkflowTemplate Security Bypass via podSpecPatch in Strict/Secure Reference Mode

9.9 Critical

CVSS3