Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23960: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in argoproj argo-workflows

0
High
VulnerabilityCVE-2026-23960cvecve-2026-23960cwe-79
Published: Wed Jan 21 2026 (01/21/2026, 22:02:50 UTC)
Source: CVE Database V5
Vendor/Project: argoproj
Product: argo-workflows

Description

CVE-2026-23960 is a high-severity stored cross-site scripting (XSS) vulnerability in Argo Workflows, an open-source Kubernetes-native workflow engine. The flaw exists in versions prior to 3. 6. 17 and between 3. 7. 0 and 3. 7. 8, where malicious JavaScript can be injected into the artifact directory listing. This allows any workflow author to execute arbitrary scripts in another user's browser under the Argo Server origin, potentially enabling unauthorized API actions with the victim's privileges. Exploitation requires user interaction and low privileges but no authentication bypass.

AI-Powered Analysis

AILast updated: 01/21/2026, 22:35:15 UTC

Technical Analysis

CVE-2026-23960 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Argo Workflows, a container-native workflow engine widely used for orchestrating parallel jobs on Kubernetes clusters. The vulnerability arises from improper neutralization of input during web page generation in the artifact directory listing feature. Specifically, malicious JavaScript code can be injected by any workflow author into the artifact directory listing, which is then stored and rendered in the Argo Server web interface. When another user views this listing, the injected script executes within their browser context under the Argo Server origin. This execution context allows the attacker to perform API actions with the victim’s privileges, potentially leading to unauthorized operations such as workflow manipulation, data exfiltration, or privilege escalation within the Kubernetes environment. The vulnerability affects Argo Workflows versions prior to 3.6.17 and versions from 3.7.0 up to but not including 3.7.8. The issue requires the attacker to have workflow author privileges and user interaction (the victim must view the malicious artifact listing). The CVSS 4.0 base score is 7.3 (high severity), reflecting network attack vector, high impact on confidentiality, integrity, and availability, but with high attack complexity and requiring user interaction. No known exploits in the wild have been reported as of the publication date. The vulnerability is mitigated by upgrading to versions 3.6.17 or 3.7.8 and later, which properly sanitize inputs to prevent script injection.

Potential Impact

For European organizations leveraging Kubernetes and Argo Workflows for container orchestration, this vulnerability poses significant risks. Successful exploitation can lead to unauthorized execution of API actions with the victim’s privileges, potentially compromising workflow integrity, exposing sensitive operational data, or disrupting automated job orchestration. This could affect critical business processes relying on automated workflows, leading to operational downtime or data breaches. Given the widespread adoption of Kubernetes and cloud-native technologies in Europe, especially in sectors like finance, manufacturing, and public services, the impact could be substantial. Additionally, the ability to execute scripts in the context of the Argo Server origin may facilitate lateral movement within the cluster or pivoting to other systems. The requirement for workflow author privileges limits the attack surface but insider threats or compromised developer accounts increase risk. The need for user interaction (viewing the malicious artifact listing) means social engineering or phishing could be leveraged to trigger exploitation. Overall, the vulnerability threatens confidentiality, integrity, and availability of Kubernetes-based workflow environments in European enterprises.

Mitigation Recommendations

1. Upgrade all Argo Workflows deployments to version 3.6.17 or 3.7.8 and later to ensure the vulnerability is patched. 2. Implement strict role-based access control (RBAC) to limit workflow author privileges only to trusted users, reducing the risk of malicious artifact injection. 3. Monitor and audit workflow artifact directories for suspicious or unexpected script content. 4. Educate users to be cautious when interacting with artifact listings, especially if sourced from untrusted workflow authors. 5. Employ network segmentation and zero-trust principles around Kubernetes management interfaces to limit exposure. 6. Integrate Web Application Firewall (WAF) rules to detect and block potential XSS payloads targeting the Argo Server interface. 7. Regularly review and update Kubernetes and Argo Workflows security configurations and keep dependencies up to date. 8. Consider implementing Content Security Policy (CSP) headers in the Argo Server to mitigate impact of any residual XSS vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.313Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697151484623b1157cf00ef4

Added to database: 1/21/2026, 10:20:56 PM

Last enriched: 1/21/2026, 10:35:15 PM

Last updated: 1/22/2026, 12:14:10 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats