CVE-2025-66626: CWE-23: Relative Path Traversal in argoproj argo-workflows
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions 3.6.13 and below and versions 3.7.0 through 3.7.4, contain unsafe untar code that handles symbolic links in archives. Concretely, the computation of a link's target and the subsequent check are flawed. An attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which would be executed at the pod's start. The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links. This issue is fixed in versions 3.6.14 and 3.7.5.
AI Analysis
Technical Summary
Argo Workflows, an open-source container-native workflow engine for Kubernetes, suffers from a critical relative path traversal vulnerability (CVE-2025-66626) in versions 3.6.13 and below and 3.7.0 through 3.7.4. The root cause lies in unsafe untar code that improperly handles symbolic links within archive files. Specifically, the computation of a symbolic link's target path and the subsequent security checks are flawed, allowing an attacker to craft malicious archives containing symbolic links that traverse directories and overwrite arbitrary files on the host filesystem. The primary impact is the ability to overwrite the file /var/run/argo/argoexec with attacker-controlled scripts. Since this file is executed at pod startup, the attacker gains the ability to execute arbitrary code within the pod context, potentially escalating privileges or disrupting workflows. Notably, the patch for a related vulnerability (CVE-2025-62156) does not mitigate this issue, indicating a distinct flaw in symbolic link handling. The vulnerability requires network access and low privileges (PR:L) but no user interaction (UI:N). The CVSS v3.1 score of 8.1 reflects a high severity due to the ease of exploitation and significant impact on integrity and availability of Kubernetes workloads orchestrated by Argo Workflows. This vulnerability affects multiple versions, including all releases prior to 3.6.14 and between 3.7.0 and 3.7.4, necessitating urgent patching. No known exploits are currently reported in the wild, but the potential for impactful attacks is high given the widespread use of Argo Workflows in cloud-native environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to Kubernetes-based CI/CD pipelines and workflow automation relying on Argo Workflows. Successful exploitation can lead to arbitrary code execution inside pods, enabling attackers to manipulate workflow execution, exfiltrate sensitive data, or disrupt critical business processes. The ability to overwrite executable files at pod startup can facilitate persistent footholds and lateral movement within containerized environments. Given the increasing adoption of Kubernetes and Argo Workflows in European enterprises, especially in sectors like finance, manufacturing, and public services, the impact includes potential operational downtime, data integrity loss, and compliance violations under regulations such as GDPR. Additionally, compromised workflows could be leveraged to deploy further malware or ransomware, amplifying the threat. The lack of required user interaction and relatively low privilege requirements increase the attack surface, especially in multi-tenant or shared Kubernetes clusters common in European cloud providers.
Mitigation Recommendations
European organizations should immediately upgrade Argo Workflows to versions 3.6.14 or 3.7.5 or later to remediate this vulnerability. Until upgrades are applied, restrict network access to Argo Workflows endpoints to trusted users and networks to limit exposure. Implement strict validation and sanitization of all archive files used in workflows, particularly scrutinizing symbolic links to prevent path traversal. Employ Kubernetes Pod Security Policies or equivalent admission controllers to restrict execution privileges and prevent unauthorized file overwrites. Monitor workflow execution logs and container file systems for unusual modifications to /var/run/argo/argoexec or other critical files. Use runtime security tools to detect anomalous pod startup behaviors indicative of exploitation. Regularly audit and rotate credentials and secrets used within workflows to limit attacker persistence. Finally, coordinate with cloud providers and security teams to ensure rapid incident response capabilities in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2025-66626: CWE-23: Relative Path Traversal in argoproj argo-workflows
Description
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions 3.6.13 and below and versions 3.7.0 through 3.7.4, contain unsafe untar code that handles symbolic links in archives. Concretely, the computation of a link's target and the subsequent check are flawed. An attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which would be executed at the pod's start. The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links. This issue is fixed in versions 3.6.14 and 3.7.5.
AI-Powered Analysis
Technical Analysis
Argo Workflows, an open-source container-native workflow engine for Kubernetes, suffers from a critical relative path traversal vulnerability (CVE-2025-66626) in versions 3.6.13 and below and 3.7.0 through 3.7.4. The root cause lies in unsafe untar code that improperly handles symbolic links within archive files. Specifically, the computation of a symbolic link's target path and the subsequent security checks are flawed, allowing an attacker to craft malicious archives containing symbolic links that traverse directories and overwrite arbitrary files on the host filesystem. The primary impact is the ability to overwrite the file /var/run/argo/argoexec with attacker-controlled scripts. Since this file is executed at pod startup, the attacker gains the ability to execute arbitrary code within the pod context, potentially escalating privileges or disrupting workflows. Notably, the patch for a related vulnerability (CVE-2025-62156) does not mitigate this issue, indicating a distinct flaw in symbolic link handling. The vulnerability requires network access and low privileges (PR:L) but no user interaction (UI:N). The CVSS v3.1 score of 8.1 reflects a high severity due to the ease of exploitation and significant impact on integrity and availability of Kubernetes workloads orchestrated by Argo Workflows. This vulnerability affects multiple versions, including all releases prior to 3.6.14 and between 3.7.0 and 3.7.4, necessitating urgent patching. No known exploits are currently reported in the wild, but the potential for impactful attacks is high given the widespread use of Argo Workflows in cloud-native environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to Kubernetes-based CI/CD pipelines and workflow automation relying on Argo Workflows. Successful exploitation can lead to arbitrary code execution inside pods, enabling attackers to manipulate workflow execution, exfiltrate sensitive data, or disrupt critical business processes. The ability to overwrite executable files at pod startup can facilitate persistent footholds and lateral movement within containerized environments. Given the increasing adoption of Kubernetes and Argo Workflows in European enterprises, especially in sectors like finance, manufacturing, and public services, the impact includes potential operational downtime, data integrity loss, and compliance violations under regulations such as GDPR. Additionally, compromised workflows could be leveraged to deploy further malware or ransomware, amplifying the threat. The lack of required user interaction and relatively low privilege requirements increase the attack surface, especially in multi-tenant or shared Kubernetes clusters common in European cloud providers.
Mitigation Recommendations
European organizations should immediately upgrade Argo Workflows to versions 3.6.14 or 3.7.5 or later to remediate this vulnerability. Until upgrades are applied, restrict network access to Argo Workflows endpoints to trusted users and networks to limit exposure. Implement strict validation and sanitization of all archive files used in workflows, particularly scrutinizing symbolic links to prevent path traversal. Employ Kubernetes Pod Security Policies or equivalent admission controllers to restrict execution privileges and prevent unauthorized file overwrites. Monitor workflow execution logs and container file systems for unusual modifications to /var/run/argo/argoexec or other critical files. Use runtime security tools to detect anomalous pod startup behaviors indicative of exploitation. Regularly audit and rotate credentials and secrets used within workflows to limit attacker persistence. Finally, coordinate with cloud providers and security teams to ensure rapid incident response capabilities in case of exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-05T15:18:02.789Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69388b5252fe50f9a48983c4
Added to database: 12/9/2025, 8:49:22 PM
Last enriched: 12/16/2025, 9:45:09 PM
Last updated: 2/7/2026, 8:50:22 AM
Views: 153
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.