CVE-2026-28229
ArgoProj · Argo Workflows
Argo Workflows template endpoints allow unauthenticated clients to leak sensitive WorkflowTemplates and Secret manifests by providing a malformed "Bearer nothing" authorization token.
Executive summary
A critical authentication bypass in Argo Workflows allows unauthenticated attackers to exfiltrate sensitive secrets and configuration data from Kubernetes environments.
Vulnerability
The application fails to properly validate authorization tokens on WorkflowTemplates and ClusterWorkflowTemplates endpoints. By submitting an "Authorization: Bearer nothing" header, an unauthenticated attacker can bypass security checks to retrieve sensitive template content, including embedded Kubernetes Secret manifests.
Business impact
The exposure of Secret manifests can lead to the compromise of cloud credentials, database passwords, and API keys, facilitating a full-scale breach of the Kubernetes cluster. With a CVSS score of 9.8, this vulnerability poses a severe risk to the confidentiality and integrity of automated CI/CD pipelines and infrastructure.
Remediation
Immediate Action: Upgrade Argo Workflows to version 4.0.2, 3.7.11, or later to patch the authentication logic.
Proactive Monitoring: Audit Kubernetes logs for unusual access patterns to the WorkflowTemplates endpoints, specifically looking for requests with malformed or placeholder Bearer tokens.
Compensating Controls: Implement Network Policies to restrict access to the Argo Workflows API to authorized users and services within the cluster.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The risk of secret leakage in a containerized environment is a critical threat that can lead to catastrophic downstream compromises. Immediate application of the official patches is required to secure sensitive workflow configurations and prevent unauthorized data exfiltration.