Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28229: CWE-863: Incorrect Authorization in argoproj argo-workflows

0
Critical
VulnerabilityCVE-2026-28229cvecve-2026-28229cwe-863
Published: Wed Mar 11 2026 (03/11/2026, 15:37:47 UTC)
Source: CVE Database V5
Vendor/Project: argoproj
Product: argo-workflows

Description

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests. This vulnerability is fixed in 4.0.2 and 3.7.11.

AI-Powered Analysis

AILast updated: 03/11/2026, 16:14:29 UTC

Technical Analysis

CVE-2026-28229 is an incorrect authorization vulnerability (CWE-863) affecting Argo Workflows, an open-source container-native workflow engine for Kubernetes. Specifically, versions >=4.0.0 and <4.0.2, and versions below 3.7.11, expose WorkflowTemplates and ClusterWorkflowTemplates endpoints without proper access control. Any client can send a request with an Authorization header containing a bearer token with the value 'nothing' or empty, bypassing authentication checks. This allows unauthorized retrieval of workflow templates, which may embed sensitive Kubernetes Secret manifests. Such exposure can lead to leakage of critical secrets used in container orchestration and automation workflows. The vulnerability is remotely exploitable over the network without authentication or user interaction, making it highly accessible to attackers. The flaw was addressed and fixed in Argo Workflows versions 4.0.2 and 3.7.11 by enforcing proper authorization checks on these endpoints. No known exploits are currently reported in the wild, but the high CVSS score of 9.8 reflects the potential impact and ease of exploitation. This vulnerability undermines the confidentiality, integrity, and availability of workflow configurations and secrets managed by Argo Workflows in Kubernetes environments.

Potential Impact

The impact of CVE-2026-28229 is critical for organizations using vulnerable versions of Argo Workflows. Unauthorized access to WorkflowTemplates and ClusterWorkflowTemplates can lead to exposure of embedded Kubernetes Secrets, which may include credentials, tokens, or other sensitive data. This can enable attackers to escalate privileges, move laterally within Kubernetes clusters, or compromise containerized applications orchestrated by Argo Workflows. The integrity of workflow definitions can be undermined if attackers modify or misuse the retrieved templates. Availability may also be affected if attackers disrupt workflow execution by manipulating or leaking sensitive configuration data. Given the widespread adoption of Kubernetes and Argo Workflows in cloud-native environments, this vulnerability poses a significant risk to cloud service providers, enterprises, and DevOps teams globally. The ease of exploitation without authentication increases the likelihood of automated scanning and attacks, potentially leading to data breaches, service disruptions, and compliance violations.

Mitigation Recommendations

To mitigate CVE-2026-28229, organizations should immediately upgrade Argo Workflows to version 4.0.2 or later, or 3.7.11 or later, where the authorization checks on WorkflowTemplates endpoints are properly enforced. Until upgrades can be applied, restrict network access to Argo Workflows API endpoints using network policies, firewalls, or API gateways to limit exposure to trusted users and systems only. Implement strong Kubernetes Role-Based Access Control (RBAC) policies to minimize permissions granted to service accounts and users interacting with Argo Workflows. Regularly audit workflow templates and embedded secrets to ensure no sensitive data is unnecessarily exposed. Monitor logs and network traffic for unusual access patterns to the WorkflowTemplates endpoints. Consider using secrets management solutions external to workflow templates to reduce secret exposure risk. Finally, integrate vulnerability scanning and continuous security assessments into the CI/CD pipeline to detect and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T15:28:40.651Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1917d2f860ef9432c8e45

Added to database: 3/11/2026, 3:59:57 PM

Last enriched: 3/11/2026, 4:14:29 PM

Last updated: 3/14/2026, 2:03:34 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses