Логотип exploitDog
bind:CVE-2025-62157
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-62157

Количество 4

Количество 4

redhat логотип

CVE-2025-62157

6 месяцев назад

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-62157

6 месяцев назад

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-c2hv-4pfj-mm2r

6 месяцев назад

Argo Workflow may expose artifact repository credentials

EPSS: Низкий
fstec логотип

BDU:2025-12969

12 месяцев назад

Уязвимость функции updateConfig() декларативного инструмента непрерывной доставки GitOps для Kubernetes Argo Workflow, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-62157

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist.

CVSS3: 6.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-62157

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist.

CVSS3: 6.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-c2hv-4pfj-mm2r

Argo Workflow may expose artifact repository credentials

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-12969

Уязвимость функции updateConfig() декларативного инструмента непрерывной доставки GitOps для Kubernetes Argo Workflow, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
0%
Низкий
12 месяцев назад

Уязвимостей на страницу