Argoproj

Argo Workflows

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 14.10.2025 15:16:12
  • Zuletzt bearbeitet 06.02.2026 20:49:29

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 14.10.2025 14:52:44
  • Zuletzt bearbeitet 06.02.2026 20:49:29

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 contain a Zip Slip path traversal vulnerability in artifact extraction. During ...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 02.12.2024 16:15:14
  • Zuletzt bearbeitet 06.02.2026 20:49:29

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. When using `--auth-mode=client`, Archived Workflows can be retrieved with a fake or spoofed token via the GET Workflow endpoint: `/api/v1...

  • EPSS 0.15%
  • Veröffentlicht 28.10.2024 16:15:03
  • Zuletzt bearbeitet 06.02.2026 20:49:29

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with...

  • EPSS 0.33%
  • Veröffentlicht 06.05.2022 00:15:07
  • Zuletzt bearbeitet 06.02.2026 20:49:29

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script whic...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 03.08.2021 00:15:08
  • Zuletzt bearbeitet 13.02.2026 21:46:43

In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.