CVE-2026-31892: CWE-863: Incorrect Authorization in argoproj argo-workflows
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 2.9.0 to before 4.0.2 and 3.7.11, A user who can submit Workflows can completely bypass all security settings defined in a WorkflowTemplate by including a podSpecPatch field in their Workflow submission. This works even when the controller is configured with templateReferencing: Strict, which is specifically documented as a mechanism to restrict users to admin-approved templates. The podSpecPatch field on a submitted Workflow takes precedence over the referenced WorkflowTemplate during spec merging and is applied directly to the pod spec at creation time with no security validation. This vulnerability is fixed in 4.0.2 and 3.7.11.
AI Analysis
Technical Summary
Argo Workflows is a widely used open-source container-native workflow engine designed for orchestrating parallel jobs on Kubernetes. The vulnerability identified as CVE-2026-31892 stems from incorrect authorization controls (CWE-863) in how Argo Workflows merges workflow specifications. Specifically, from versions 2.9.0 up to but not including 3.7.11, and from 4.0.0 up to but not including 4.0.2, a user with the ability to submit workflows can include a podSpecPatch field in their workflow submission. This podSpecPatch overrides the pod specification defined in the referenced WorkflowTemplate during the spec merging process. Critically, this override bypasses all security settings and validations intended to restrict users to admin-approved templates, even when the controller is configured with templateReferencing set to Strict. The podSpecPatch is applied directly to the pod spec at creation time without any security validation, allowing malicious users to escalate privileges or execute unauthorized actions within the Kubernetes cluster. The vulnerability has been assigned a CVSS 4.0 base score of 8.9, indicating a high severity level. It requires low privileges (workflow submission rights), no user interaction, and can be exploited remotely over the network. Although no known exploits have been reported in the wild, the flaw presents a significant risk to environments running affected versions. The issue was fixed in Argo Workflows versions 3.7.11 and 4.0.2 by enforcing proper authorization checks and validation of podSpecPatch usage.
Potential Impact
This vulnerability allows an attacker with workflow submission privileges to bypass security controls and inject arbitrary pod specifications, potentially leading to privilege escalation within Kubernetes clusters. The attacker can override security policies, run unauthorized containers, or escalate access beyond intended boundaries. This compromises the confidentiality and integrity of workloads and may lead to lateral movement, data exfiltration, or disruption of services. Since Argo Workflows is often used in CI/CD pipelines and production orchestration, exploitation could undermine the security of critical infrastructure and applications. The impact is heightened in environments where strict template referencing is relied upon for security governance, as this mechanism is rendered ineffective by the vulnerability. Organizations using affected versions face risks of unauthorized code execution, container escape, or deployment of malicious workloads, which can have cascading effects on cloud-native infrastructure and business operations.
Mitigation Recommendations
Organizations should immediately upgrade Argo Workflows to version 3.7.11 or 4.0.2 or later, where the vulnerability is fixed. Until upgrades are applied, restrict workflow submission permissions to trusted users only and audit existing permissions to minimize exposure. Implement network segmentation and Kubernetes RBAC policies to limit the blast radius of compromised accounts. Monitor workflow submissions for unexpected podSpecPatch usage or anomalous pod specifications. Employ admission controllers or policy enforcement tools such as OPA Gatekeeper or Kyverno to validate and restrict podSpecPatch fields in workflows. Regularly review and harden Kubernetes cluster security configurations, including Pod Security Policies or Pod Security Admission to prevent privilege escalation. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. Finally, stay informed on Argo Workflows security advisories and apply patches promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-31892: CWE-863: Incorrect Authorization in argoproj argo-workflows
Description
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 2.9.0 to before 4.0.2 and 3.7.11, A user who can submit Workflows can completely bypass all security settings defined in a WorkflowTemplate by including a podSpecPatch field in their Workflow submission. This works even when the controller is configured with templateReferencing: Strict, which is specifically documented as a mechanism to restrict users to admin-approved templates. The podSpecPatch field on a submitted Workflow takes precedence over the referenced WorkflowTemplate during spec merging and is applied directly to the pod spec at creation time with no security validation. This vulnerability is fixed in 4.0.2 and 3.7.11.
AI-Powered Analysis
Technical Analysis
Argo Workflows is a widely used open-source container-native workflow engine designed for orchestrating parallel jobs on Kubernetes. The vulnerability identified as CVE-2026-31892 stems from incorrect authorization controls (CWE-863) in how Argo Workflows merges workflow specifications. Specifically, from versions 2.9.0 up to but not including 3.7.11, and from 4.0.0 up to but not including 4.0.2, a user with the ability to submit workflows can include a podSpecPatch field in their workflow submission. This podSpecPatch overrides the pod specification defined in the referenced WorkflowTemplate during the spec merging process. Critically, this override bypasses all security settings and validations intended to restrict users to admin-approved templates, even when the controller is configured with templateReferencing set to Strict. The podSpecPatch is applied directly to the pod spec at creation time without any security validation, allowing malicious users to escalate privileges or execute unauthorized actions within the Kubernetes cluster. The vulnerability has been assigned a CVSS 4.0 base score of 8.9, indicating a high severity level. It requires low privileges (workflow submission rights), no user interaction, and can be exploited remotely over the network. Although no known exploits have been reported in the wild, the flaw presents a significant risk to environments running affected versions. The issue was fixed in Argo Workflows versions 3.7.11 and 4.0.2 by enforcing proper authorization checks and validation of podSpecPatch usage.
Potential Impact
This vulnerability allows an attacker with workflow submission privileges to bypass security controls and inject arbitrary pod specifications, potentially leading to privilege escalation within Kubernetes clusters. The attacker can override security policies, run unauthorized containers, or escalate access beyond intended boundaries. This compromises the confidentiality and integrity of workloads and may lead to lateral movement, data exfiltration, or disruption of services. Since Argo Workflows is often used in CI/CD pipelines and production orchestration, exploitation could undermine the security of critical infrastructure and applications. The impact is heightened in environments where strict template referencing is relied upon for security governance, as this mechanism is rendered ineffective by the vulnerability. Organizations using affected versions face risks of unauthorized code execution, container escape, or deployment of malicious workloads, which can have cascading effects on cloud-native infrastructure and business operations.
Mitigation Recommendations
Organizations should immediately upgrade Argo Workflows to version 3.7.11 or 4.0.2 or later, where the vulnerability is fixed. Until upgrades are applied, restrict workflow submission permissions to trusted users only and audit existing permissions to minimize exposure. Implement network segmentation and Kubernetes RBAC policies to limit the blast radius of compromised accounts. Monitor workflow submissions for unexpected podSpecPatch usage or anomalous pod specifications. Employ admission controllers or policy enforcement tools such as OPA Gatekeeper or Kyverno to validate and restrict podSpecPatch fields in workflows. Regularly review and harden Kubernetes cluster security configurations, including Pod Security Policies or Pod Security Admission to prevent privilege escalation. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. Finally, stay informed on Argo Workflows security advisories and apply patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-09T21:59:02.687Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b1917d2f860ef9432c8e48
Added to database: 3/11/2026, 3:59:57 PM
Last enriched: 3/11/2026, 4:14:12 PM
Last updated: 3/14/2026, 2:52:20 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.