CVE-2026-23960: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in argoproj argo-workflows
CVE-2026-23960 is a high-severity stored cross-site scripting (XSS) vulnerability in Argo Workflows, an open-source Kubernetes-native workflow engine. The flaw exists in versions prior to 3. 6. 17 and between 3. 7. 0 and 3. 7. 8, where malicious JavaScript can be injected into the artifact directory listing. This allows any workflow author to execute arbitrary scripts in another user's browser under the Argo Server origin, potentially enabling unauthorized API actions with the victim's privileges. Exploitation requires user interaction and low privileges but no authentication.
AI Analysis
Technical Summary
CVE-2026-23960 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Argo Workflows, a container-native workflow engine widely used for orchestrating parallel jobs on Kubernetes clusters. The vulnerability arises from improper neutralization of input during web page generation specifically in the artifact directory listing feature. In affected versions (<3.6.17 and >=3.7.0 <3.7.8), any user with workflow authoring capabilities can inject malicious JavaScript code into the artifact directory listing. When another user views this listing via the Argo Server web interface, the injected script executes in their browser context with the origin of the Argo Server. This enables the attacker to perform API actions on behalf of the victim, leveraging their privileges. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no authentication required (AT:N), low privileges required (PR:L), and user interaction needed (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level due to the ability to hijack sessions, manipulate workflows, or disrupt operations. The issue is fixed in versions 3.6.17 and 3.7.8. No public exploit code or active exploitation has been reported yet, but the risk remains significant given the nature of the vulnerability and the critical role of Argo Workflows in Kubernetes environments.
Potential Impact
For European organizations, especially those leveraging Kubernetes and container orchestration in cloud-native environments, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized execution of arbitrary JavaScript in users' browsers, enabling attackers to hijack sessions, escalate privileges, and perform unauthorized API actions within the Argo Workflows environment. This could result in data leakage, manipulation or disruption of automated workflows, and potential lateral movement within the infrastructure. Given the growing adoption of Kubernetes in European enterprises and public sector organizations, the impact could extend to critical infrastructure, financial services, and technology sectors. The requirement for user interaction and low privileges reduces the attack surface somewhat but does not eliminate the risk, especially in environments with multiple workflow authors and users accessing the Argo Server UI. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of patching to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should immediately verify their Argo Workflows versions and upgrade to at least 3.6.17 or 3.7.8 to remediate the vulnerability. Beyond patching, organizations should implement strict role-based access control (RBAC) to limit workflow authoring privileges to trusted users only, reducing the risk of malicious script injection. Enforce Content Security Policy (CSP) headers on the Argo Server web interface to restrict the execution of unauthorized scripts. Regularly audit workflow definitions and artifact directories for suspicious or unexpected content. Employ network segmentation to isolate Kubernetes management interfaces and restrict access to the Argo Server UI to trusted networks and users. Enable multi-factor authentication (MFA) for accessing the Argo Server to mitigate risks from compromised credentials. Monitor logs and API activity for anomalous behavior indicative of exploitation attempts. Finally, educate users about the risks of interacting with untrusted workflows and artifacts to reduce the likelihood of user interaction-based exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2026-23960: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in argoproj argo-workflows
Description
CVE-2026-23960 is a high-severity stored cross-site scripting (XSS) vulnerability in Argo Workflows, an open-source Kubernetes-native workflow engine. The flaw exists in versions prior to 3. 6. 17 and between 3. 7. 0 and 3. 7. 8, where malicious JavaScript can be injected into the artifact directory listing. This allows any workflow author to execute arbitrary scripts in another user's browser under the Argo Server origin, potentially enabling unauthorized API actions with the victim's privileges. Exploitation requires user interaction and low privileges but no authentication.
AI-Powered Analysis
Technical Analysis
CVE-2026-23960 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Argo Workflows, a container-native workflow engine widely used for orchestrating parallel jobs on Kubernetes clusters. The vulnerability arises from improper neutralization of input during web page generation specifically in the artifact directory listing feature. In affected versions (<3.6.17 and >=3.7.0 <3.7.8), any user with workflow authoring capabilities can inject malicious JavaScript code into the artifact directory listing. When another user views this listing via the Argo Server web interface, the injected script executes in their browser context with the origin of the Argo Server. This enables the attacker to perform API actions on behalf of the victim, leveraging their privileges. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no authentication required (AT:N), low privileges required (PR:L), and user interaction needed (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level due to the ability to hijack sessions, manipulate workflows, or disrupt operations. The issue is fixed in versions 3.6.17 and 3.7.8. No public exploit code or active exploitation has been reported yet, but the risk remains significant given the nature of the vulnerability and the critical role of Argo Workflows in Kubernetes environments.
Potential Impact
For European organizations, especially those leveraging Kubernetes and container orchestration in cloud-native environments, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized execution of arbitrary JavaScript in users' browsers, enabling attackers to hijack sessions, escalate privileges, and perform unauthorized API actions within the Argo Workflows environment. This could result in data leakage, manipulation or disruption of automated workflows, and potential lateral movement within the infrastructure. Given the growing adoption of Kubernetes in European enterprises and public sector organizations, the impact could extend to critical infrastructure, financial services, and technology sectors. The requirement for user interaction and low privileges reduces the attack surface somewhat but does not eliminate the risk, especially in environments with multiple workflow authors and users accessing the Argo Server UI. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of patching to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should immediately verify their Argo Workflows versions and upgrade to at least 3.6.17 or 3.7.8 to remediate the vulnerability. Beyond patching, organizations should implement strict role-based access control (RBAC) to limit workflow authoring privileges to trusted users only, reducing the risk of malicious script injection. Enforce Content Security Policy (CSP) headers on the Argo Server web interface to restrict the execution of unauthorized scripts. Regularly audit workflow definitions and artifact directories for suspicious or unexpected content. Employ network segmentation to isolate Kubernetes management interfaces and restrict access to the Argo Server UI to trusted networks and users. Enable multi-factor authentication (MFA) for accessing the Argo Server to mitigate risks from compromised credentials. Monitor logs and API activity for anomalous behavior indicative of exploitation attempts. Finally, educate users about the risks of interacting with untrusted workflows and artifacts to reduce the likelihood of user interaction-based exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T14:49:06.313Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697151484623b1157cf00ef4
Added to database: 1/21/2026, 10:20:56 PM
Last enriched: 1/29/2026, 8:48:14 AM
Last updated: 2/6/2026, 9:03:42 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25631: CWE-20: Improper Input Validation in n8n-io n8n
MediumCVE-2026-25592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in microsoft semantic-kernel
CriticalCVE-2026-2066: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2026-25634: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.