CVE-2026-31892

HIGH

Argo Workflows 2.9.0-4.0.1/3.7.0-3.7.10 - Auth Bypass

Title source: llm
STIX 2.1

Description

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 2.9.0 to before 4.0.2 and 3.7.11, A user who can submit Workflows can completely bypass all security settings defined in a WorkflowTemplate by including a podSpecPatch field in their Workflow submission. This works even when the controller is configured with templateReferencing: Strict, which is specifically documented as a mechanism to restrict users to admin-approved templates. The podSpecPatch field on a submitted Workflow takes precedence over the referenced WorkflowTemplate during spec merging and is applied directly to the pod spec at creation time with no security validation. This vulnerability is fixed in 4.0.2 and 3.7.11.

Scores

CVSS v3 8.1
EPSS 0.0004
EPSS Percentile 12.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-863
Status published
Products (4)
argoproj/argo-workflows 0 - 3.7.11Go
argoproj/argo-workflows 0 - 4.0.2Go
argoproj/argo-workflows 2.9.0Go
argoproj/argo_workflows 2.9.0 - 3.7.11
Published Mar 11, 2026
Tracked Since Mar 11, 2026