PT-2025-40056 · Argo Cd · Argo Cd

Jake-Ciolek

+1

·

Published

2025-09-30

·

Updated

2026-02-27

·

CVE-2025-59537

CVSS v3.1

9.8

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Argo CD versions 1.2.0 through 1.8.7 Argo CD versions 2.0.0-rc1 through 2.14.19 Argo CD versions 3.0.0-rc1 through 3.2.0-rc1 Argo CD version 3.1.7 Argo CD version 3.0.18
Description Argo CD is susceptible to malicious API requests that can lead to a denial of service, crashing the API server and disrupting service for legitimate users. Specifically, the /api/webhook endpoint is vulnerable when the webhook.gogs.secret is not configured. In this scenario, receiving a Gogs push event with a missing or null commits[].repo JSON field causes the argocd-server process to crash. The affectedRevisionInfo function lacks proper data structure validation for webhook event types, allowing an attacker to exploit this by sending crafted data. The vulnerability resides in the Handler function, which parses webhook type messages based on the header and body parameters. The Parse function unmarshals JSON-type messages without strict validation. An attacker can repeatedly send unauthenticated requests to the /api/webhook endpoint to cause a denial of service.
Recommendations For versions 1.2.0 through 1.8.7, configure a webhook secret to ensure only trusted parties can invoke the webhook handler. For versions 2.0.0-rc1 through 2.14.19, configure a webhook secret to ensure only trusted parties can invoke the webhook handler. For versions 3.0.0-rc1 through 3.2.0-rc1, configure a webhook secret to ensure only trusted parties can invoke the webhook handler. For version 3.1.7, configure a webhook secret to ensure only trusted parties can invoke the webhook handler. For version 3.0.18, configure a webhook secret to ensure only trusted parties can invoke the webhook handler. If Gogs is not used, set the webhook.gogs.secret to a long, random value to disable Gogs payload handling.

Exploit

Fix

DoS

RCE

NULL Pointer Dereference

Weakness Enumeration

Related Identifiers

BIT-ARGO-CD-2025-59537
CLEANSTART-2026-AC12204
CLEANSTART-2026-AJ16639
CLEANSTART-2026-BD53293
CLEANSTART-2026-CZ81512
CLEANSTART-2026-DZ05206
CLEANSTART-2026-EC15228
CLEANSTART-2026-ER93728
CLEANSTART-2026-FF98917
CLEANSTART-2026-GL70025
CLEANSTART-2026-IO04548
CLEANSTART-2026-JR48309
CLEANSTART-2026-KU65968
CLEANSTART-2026-KZ60560
CLEANSTART-2026-LS98939
CLEANSTART-2026-NP17404
CLEANSTART-2026-NV34418
CLEANSTART-2026-OA33370
CLEANSTART-2026-PN58989
CLEANSTART-2026-QC30410
CLEANSTART-2026-UO76615
CLEANSTART-2026-WP10148
CLEANSTART-2026-WQ07901
CLEANSTART-2026-XR85161
CLEANSTART-2026-YQ79300
CLEANSTART-2026-YW12690
CVE-2025-59537
GHSA-WP4P-9PXH-CGX2
GO-2025-3996
OPENSUSE-SU-2025:15666-1
SUSE-SU-2025:3799-1

Affected Products

Argo Cd