Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24748: CWE-863: Incorrect Authorization in akuity kargo

0
Medium
VulnerabilityCVE-2026-24748cvecve-2026-24748cwe-863
Published: Tue Jan 27 2026 (01/27/2026, 21:23:53 UTC)
Source: CVE Database V5
Vendor/Project: akuity
Product: kargo

Description

CVE-2026-24748 is an incorrect authorization vulnerability in akuity's Kargo software versions prior to 1. 8. 7, 1. 7. 7, and 1. 6. 3. It allows unauthenticated attackers to access the GetConfig() API endpoint by providing any non-empty Bearer token, leading to exposure of configuration data such as Argo CD cluster endpoints. This information can be leveraged to enumerate cluster URLs and namespaces for further attacks. Additionally, the RefreshResource endpoint is vulnerable to unauthenticated denial-of-service attacks by triggering excessive Kubernetes resource reconciliations, potentially degrading API server performance.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:14:36 UTC

Technical Analysis

The vulnerability CVE-2026-24748 in akuity's Kargo software arises from improper authorization checks on critical API endpoints. Specifically, the GetConfig() endpoint fails to validate the authenticity of Bearer tokens, allowing any non-empty token to bypass authentication controls. This flaw enables unauthenticated attackers to retrieve sensitive configuration data, including endpoints for connected Argo CD clusters. Such data disclosure facilitates reconnaissance activities, enabling attackers to map cluster URLs and namespaces, which can be exploited in subsequent targeted attacks against Kubernetes environments. Furthermore, the RefreshResource endpoint suffers from the same authorization bypass, permitting unauthenticated users to trigger Kubernetes resource reconciliations by setting annotations. If abused in a loop, this can cause denial-of-service conditions by overloading the Kubernetes API server and slowing legitimate operations. The vulnerability affects Kargo versions prior to 1.6.3, between 1.7.0 and 1.7.7, and between 1.8.0 and 1.8.7. The issue has been addressed in versions 1.6.3, 1.7.7, and 1.8.7. No workarounds exist, making patching the only effective mitigation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality and availability impacts, resulting in a medium severity rating of 6.9.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and availability of Kubernetes cluster management infrastructure. Exposure of Argo CD cluster endpoints and namespaces can lead to targeted attacks such as unauthorized access, lateral movement, or supply chain compromise within Kubernetes environments. The denial-of-service potential on the RefreshResource endpoint can degrade cluster performance, impacting critical software deployment pipelines and automation workflows. Organizations relying on Kargo for artifact promotion and cluster management may experience operational disruptions and increased attack surface. Given the widespread adoption of Kubernetes and GitOps tools like Argo CD in Europe’s technology sectors, including finance, manufacturing, and government, exploitation could have cascading effects on service availability and data integrity. The lack of authentication requirements and ease of exploitation increase the likelihood of opportunistic attacks, especially in environments exposed to the internet or insufficiently segmented networks.

Mitigation Recommendations

European organizations should immediately verify their Kargo deployment versions and upgrade to at least 1.6.3, 1.7.7, or 1.8.7 as applicable. Since no workarounds exist, patching is critical. Additionally, organizations should restrict network access to Kargo API endpoints using firewall rules or network segmentation to limit exposure to trusted internal hosts. Implementing strict ingress controls and monitoring API usage patterns can help detect anomalous access attempts. Kubernetes clusters connected to Kargo should have robust role-based access controls (RBAC) and audit logging enabled to identify suspicious reconciliation triggers. Organizations should also review and rotate any credentials or tokens that may have been exposed due to this vulnerability. Finally, integrating vulnerability scanning and continuous monitoring for Kargo and related GitOps tools will help prevent future exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T19:06:16.060Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69792fbd4623b1157c48ea50

Added to database: 1/27/2026, 9:35:57 PM

Last enriched: 2/4/2026, 9:14:36 AM

Last updated: 2/8/2026, 2:05:07 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats