PT-2025-36094 · Argo Cd · Argo Cd
Ntammineni5
·
Published
2025-09-04
·
Updated
2025-09-07
·
CVE-2025-55190
9.9
Critical
Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Argo CD versions 2.13.0 through 2.13.8
Argo CD versions 2.14.0 through 2.14.15
Argo CD versions 3.0.0 through 3.0.12
Argo CD versions 3.1.0-rc1 through 3.1.1
**Description:**
Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes, contains a flaw where API tokens with project-level permissions can retrieve sensitive repository credentials (usernames, passwords) through the project details `API endpoint`, even without explicit access to secrets. Tokens with project get permissions, including global permissions such as `p, role/user, projects, get, *, allow`, are also affected. Approximately 488,000+ services and 89,000+ results are found to be using Argo CD.
**Recommendations:**
Argo CD versions prior to 2.13.9
Argo CD versions prior to 2.14.16
Argo CD versions prior to 3.0.14
Argo CD versions prior to 3.1.2
Fix
RCE
Information Disclosure
Weakness Enumeration
Related Identifiers
Affected Products
References · 25
- https://nvd.nist.gov/vuln/detail/CVE-2025-55190 · Security Note
- https://github.com/argoproj/argo-cd/commit/e8f86101f5378662ae6151ce5c3a76e9141900e8⭐ 20541 🔗 6352 · Note
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff⭐ 20541 🔗 6352 · Note
- https://twitter.com/CrowdCyber_Com/status/1963839577929445463 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1963794470618489079 · Twitter Post
- https://twitter.com/AndreGironda/status/1963958860818817469 · Twitter Post
- https://twitter.com/zoomeye_team/status/1964328744287686786 · Twitter Post
- https://t.me/pentestingnews/67555 · Telegram Post
- https://twitter.com/fofabot/status/1963900529165344918 · Twitter Post
- https://twitter.com/freedomhack101/status/1963976801228866037 · Twitter Post
- https://twitter.com/K3YPTlC/status/1964257445456273586 · Twitter Post
- https://t.me/CVEtracker/31739 · Telegram Post
- https://twitter.com/Newtalics/status/1964222924967080296 · Twitter Post
- https://twitter.com/K3YPTlC/status/1964438331606835534 · Twitter Post
- https://twitter.com/HunterMapping/status/1963899103634399543 · Twitter Post