CVE-2025-55190
Argo · Argo CD
A critical vulnerability has been discovered in Argo CD, a widely used continuous delivery tool for Kubernetes.
Executive summary
A critical vulnerability has been discovered in Argo CD, a widely used continuous delivery tool for Kubernetes. This flaw allows an unauthenticated remote attacker to bypass security controls and gain administrative-level access to the Argo CD platform. Successful exploitation could lead to a complete compromise of managed Kubernetes environments, enabling the attacker to deploy malicious applications, steal sensitive data, and disrupt critical services.
Vulnerability
The vulnerability exists due to an improper validation flaw in the API server's handling of JSON Web Tokens (JWTs). An unauthenticated attacker can craft a malicious API token with a specially formed payload that bypasses the signature verification mechanism. By sending this crafted token in an API request, the attacker can impersonate an administrator, granting them full control over the Argo CD instance. This allows the attacker to create, modify, and delete applications, access sensitive information such as repository credentials and cluster secrets, and execute arbitrary code within the managed Kubernetes clusters.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.9, reflecting the extreme risk it poses to the organization. As Argo CD is a core component of the software delivery pipeline, its compromise can have catastrophic consequences. An attacker could inject malicious code into production applications, exfiltrate sensitive customer or corporate data, deploy ransomware or cryptomining software across the infrastructure, and cause widespread service outages. The potential for a supply chain attack originating from a compromised Argo CD instance represents a significant threat to business operations, reputation, and financial stability.
Remediation
Immediate Action: Immediately update all vulnerable Argo CD instances to the latest patched version as recommended by the vendor. After patching, it is strongly advised to revoke all existing API tokens and issue new ones. Concurrently, review Argo CD and Kubernetes audit logs for any unauthorized or suspicious activity, such as unexpected application deployments, configuration changes, or secret access.
Proactive Monitoring: Implement enhanced monitoring of the Argo CD API server. Specifically, monitor for API requests with malformed or unusual JWTs, a sudden spike in failed authentication attempts, or API calls from unknown IP addresses. Ingress and egress network traffic from Argo CD pods should be monitored for anomalous patterns indicative of data exfiltration or command-and-control communication.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk of exploitation:
- Restrict network access to the Argo CD API server to only trusted IP addresses and internal networks.
- Place the Argo CD instance behind a Web Application Firewall (WAF) with rules configured to inspect and block malicious JWT patterns.
- Enforce the principle of least privilege by regularly auditing and limiting the permissions granted to Argo CD within the managed Kubernetes clusters.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical severity of this vulnerability, we recommend treating its remediation as the highest priority. The potential for a complete compromise of the CI/CD pipeline and all associated Kubernetes environments presents an unacceptable risk. Organizations must apply the vendor-provided patches to all affected Argo CD instances immediately. Although this CVE is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion, and it should be addressed with the urgency of an actively exploited threat.