CVE-2023-40025
MEDIUMArgoproj Argo CD < 2.6.13 - Insufficient Session Expiration
Title source: ruleDescription
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting from version 2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already. A patch for this vulnerability has been released in the following Argo CD versions: 2.6.14, 2.7.12 and 2.8.1.
References (2)
Core 2
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/argoproj/argo-cd/security/advisories/GHSA-c8xw-vjgf-94hr
Scores
CVSS v3
4.7
EPSS
0.0018
EPSS Percentile
38.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-613
Status
published
Products (4)
argoproj/argo-cd
2.6.0 - 2.6.14Go
argoproj/argo_cd
2.7.11
argoproj/argo_cd
2.8.0
argoproj/argo_cd
2.6.0 - 2.6.13
Published
Aug 23, 2023
Tracked Since
Feb 18, 2026