CVE-2026-28229: CWE-863: Incorrect Authorization in argoproj argo-workflows
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests. This vulnerability is fixed in 4.0.2 and 3.7.11.
AI Analysis
Technical Summary
CVE-2026-28229 is an incorrect authorization vulnerability (CWE-863) affecting Argo Workflows, an open-source container-native workflow engine for Kubernetes. Specifically, versions >=4.0.0 and <4.0.2, and versions below 3.7.11, expose WorkflowTemplates and ClusterWorkflowTemplates endpoints without proper access control. Any client can send a request with an Authorization header containing a bearer token with the value 'nothing' or empty, bypassing authentication checks. This allows unauthorized retrieval of workflow templates, which may embed sensitive Kubernetes Secret manifests. Such exposure can lead to leakage of critical secrets used in container orchestration and automation workflows. The vulnerability is remotely exploitable over the network without authentication or user interaction, making it highly accessible to attackers. The flaw was addressed and fixed in Argo Workflows versions 4.0.2 and 3.7.11 by enforcing proper authorization checks on these endpoints. No known exploits are currently reported in the wild, but the high CVSS score of 9.8 reflects the potential impact and ease of exploitation. This vulnerability undermines the confidentiality, integrity, and availability of workflow configurations and secrets managed by Argo Workflows in Kubernetes environments.
Potential Impact
The impact of CVE-2026-28229 is critical for organizations using vulnerable versions of Argo Workflows. Unauthorized access to WorkflowTemplates and ClusterWorkflowTemplates can lead to exposure of embedded Kubernetes Secrets, which may include credentials, tokens, or other sensitive data. This can enable attackers to escalate privileges, move laterally within Kubernetes clusters, or compromise containerized applications orchestrated by Argo Workflows. The integrity of workflow definitions can be undermined if attackers modify or misuse the retrieved templates. Availability may also be affected if attackers disrupt workflow execution by manipulating or leaking sensitive configuration data. Given the widespread adoption of Kubernetes and Argo Workflows in cloud-native environments, this vulnerability poses a significant risk to cloud service providers, enterprises, and DevOps teams globally. The ease of exploitation without authentication increases the likelihood of automated scanning and attacks, potentially leading to data breaches, service disruptions, and compliance violations.
Mitigation Recommendations
To mitigate CVE-2026-28229, organizations should immediately upgrade Argo Workflows to version 4.0.2 or later, or 3.7.11 or later, where the authorization checks on WorkflowTemplates endpoints are properly enforced. Until upgrades can be applied, restrict network access to Argo Workflows API endpoints using network policies, firewalls, or API gateways to limit exposure to trusted users and systems only. Implement strong Kubernetes Role-Based Access Control (RBAC) policies to minimize permissions granted to service accounts and users interacting with Argo Workflows. Regularly audit workflow templates and embedded secrets to ensure no sensitive data is unnecessarily exposed. Monitor logs and network traffic for unusual access patterns to the WorkflowTemplates endpoints. Consider using secrets management solutions external to workflow templates to reduce secret exposure risk. Finally, integrate vulnerability scanning and continuous security assessments into the CI/CD pipeline to detect and remediate similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-28229: CWE-863: Incorrect Authorization in argoproj argo-workflows
Description
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests. This vulnerability is fixed in 4.0.2 and 3.7.11.
AI-Powered Analysis
Technical Analysis
CVE-2026-28229 is an incorrect authorization vulnerability (CWE-863) affecting Argo Workflows, an open-source container-native workflow engine for Kubernetes. Specifically, versions >=4.0.0 and <4.0.2, and versions below 3.7.11, expose WorkflowTemplates and ClusterWorkflowTemplates endpoints without proper access control. Any client can send a request with an Authorization header containing a bearer token with the value 'nothing' or empty, bypassing authentication checks. This allows unauthorized retrieval of workflow templates, which may embed sensitive Kubernetes Secret manifests. Such exposure can lead to leakage of critical secrets used in container orchestration and automation workflows. The vulnerability is remotely exploitable over the network without authentication or user interaction, making it highly accessible to attackers. The flaw was addressed and fixed in Argo Workflows versions 4.0.2 and 3.7.11 by enforcing proper authorization checks on these endpoints. No known exploits are currently reported in the wild, but the high CVSS score of 9.8 reflects the potential impact and ease of exploitation. This vulnerability undermines the confidentiality, integrity, and availability of workflow configurations and secrets managed by Argo Workflows in Kubernetes environments.
Potential Impact
The impact of CVE-2026-28229 is critical for organizations using vulnerable versions of Argo Workflows. Unauthorized access to WorkflowTemplates and ClusterWorkflowTemplates can lead to exposure of embedded Kubernetes Secrets, which may include credentials, tokens, or other sensitive data. This can enable attackers to escalate privileges, move laterally within Kubernetes clusters, or compromise containerized applications orchestrated by Argo Workflows. The integrity of workflow definitions can be undermined if attackers modify or misuse the retrieved templates. Availability may also be affected if attackers disrupt workflow execution by manipulating or leaking sensitive configuration data. Given the widespread adoption of Kubernetes and Argo Workflows in cloud-native environments, this vulnerability poses a significant risk to cloud service providers, enterprises, and DevOps teams globally. The ease of exploitation without authentication increases the likelihood of automated scanning and attacks, potentially leading to data breaches, service disruptions, and compliance violations.
Mitigation Recommendations
To mitigate CVE-2026-28229, organizations should immediately upgrade Argo Workflows to version 4.0.2 or later, or 3.7.11 or later, where the authorization checks on WorkflowTemplates endpoints are properly enforced. Until upgrades can be applied, restrict network access to Argo Workflows API endpoints using network policies, firewalls, or API gateways to limit exposure to trusted users and systems only. Implement strong Kubernetes Role-Based Access Control (RBAC) policies to minimize permissions granted to service accounts and users interacting with Argo Workflows. Regularly audit workflow templates and embedded secrets to ensure no sensitive data is unnecessarily exposed. Monitor logs and network traffic for unusual access patterns to the WorkflowTemplates endpoints. Consider using secrets management solutions external to workflow templates to reduce secret exposure risk. Finally, integrate vulnerability scanning and continuous security assessments into the CI/CD pipeline to detect and remediate similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-25T15:28:40.651Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b1917d2f860ef9432c8e45
Added to database: 3/11/2026, 3:59:57 PM
Last enriched: 3/11/2026, 4:14:29 PM
Last updated: 3/14/2026, 2:03:34 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.