Impact
Argo Workflows suffers a stored cross‑site scripting flaw that appears in the artifact directory listing. The vulnerability, classified as CWE‑79, allows a workflow author to embed malicious JavaScript that is executed in the victim’s browser under the Argo Server origin. The injected script can then perform API calls using the victim’s privileges, effectively giving the attacker the ability to act on behalf of the user and potentially compromise workflow or cluster resources.
Affected Systems
The flaw exists in all releases of Argo Workflows before v3.6.17 and v3.7.8. Any installation of these affected versions that exposes artifact listings is at risk.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.3 and an EPSS score of less than 1 %, indicating a moderate severity but low current exploitation probability, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires an authorized workflow author who can create or modify a workflow that presents a malicious artifact; once a victim views the listing, the stored XSS payload runs in the victim’s browser and enables the attacker to perform privileged API actions.
OpenCVE Enrichment
Github GHSA