Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62157: CWE-522: Insufficiently Protected Credentials in argoproj argo-workflows

0
High
VulnerabilityCVE-2025-62157cvecve-2025-62157cwe-522
Published: Tue Oct 14 2025 (10/14/2025, 15:06:39 UTC)
Source: CVE Database V5
Vendor/Project: argoproj
Product: argo-workflows

Description

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:23:24 UTC

Technical Analysis

CVE-2025-62157 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Argo Workflows, a widely used open-source container-native workflow engine for Kubernetes. The flaw exists in versions prior to 3.6.12 and between 3.7.0 and 3.7.2, where artifact repository credentials are logged in plaintext inside the workflow-controller pod logs. These credentials typically grant access to artifact repositories used to store container images, workflow artifacts, or other critical resources. An attacker who has permissions to read pod logs within the Kubernetes namespace running Argo Workflows can extract these sensitive credentials without needing network access or user interaction. The vulnerability arises from improper handling and logging of sensitive information, violating best practices for credential management and logging hygiene. The CVSS 4.0 base score is 8.5, reflecting the high impact on confidentiality and integrity, ease of exploitation (no authentication or user interaction required beyond pod log read permissions), and the potential for widespread impact within affected clusters. The vulnerability does not affect availability directly but can lead to further attacks such as unauthorized access to artifact repositories, enabling supply chain compromises or lateral movement. The issue is remediated by upgrading Argo Workflows to versions 3.6.12 or 3.7.3, which remove the logging of plaintext credentials. No known workarounds exist, emphasizing the importance of timely patching. No exploits have been observed in the wild as of the publication date, but the vulnerability's nature makes it a critical risk in multi-tenant or shared Kubernetes environments where pod log access may be granted to less trusted users or service accounts.

Potential Impact

For European organizations, the exposure of artifact repository credentials can have severe consequences. Compromise of these credentials may allow attackers to access, modify, or inject malicious artifacts into the software supply chain, undermining the integrity of deployed applications and workflows. This can lead to widespread disruption, data breaches, or ransomware attacks if malicious containers or workflows are executed. Organizations relying on Kubernetes and Argo Workflows for CI/CD pipelines, especially in sectors like finance, healthcare, and critical infrastructure, face increased risk of supply chain attacks. Additionally, the vulnerability could facilitate lateral movement within Kubernetes clusters, escalating privileges or accessing sensitive data. Given the increasing adoption of Kubernetes and container orchestration in Europe, the potential impact is significant, particularly in environments with insufficient role-based access control (RBAC) or inadequate log access restrictions. The lack of known workarounds means that unpatched systems remain exposed until updated, increasing the window of risk.

Mitigation Recommendations

European organizations should immediately assess their Argo Workflows deployments and upgrade to version 3.6.12 or 3.7.3 or later to eliminate the plaintext credential logging. In parallel, review and tighten Kubernetes RBAC policies to restrict pod log access strictly to trusted administrators and service accounts, minimizing the risk of unauthorized log reading. Implement monitoring and alerting on unusual pod log access patterns to detect potential reconnaissance or exploitation attempts. Consider rotating artifact repository credentials that may have been exposed prior to patching. Employ secrets management solutions that avoid embedding credentials in logs or environment variables. Conduct regular audits of workflow-controller logs to identify any credential leakage and remediate accordingly. Finally, integrate security scanning and vulnerability management into the CI/CD pipeline to detect and remediate such issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-07T16:12:03.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee69461b3029e3c7d96f95

Added to database: 10/14/2025, 3:16:22 PM

Last enriched: 10/14/2025, 3:23:24 PM

Last updated: 10/16/2025, 12:12:57 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats