Impact
The vulnerability is a nil pointer dereference (CWE-476) in the rbacAuthorization function of the gateway server for Argo Workflows. When an SSO user’s claims match a namespace-level RBAC rule but do not match an SSO-namespace rule, and the SSO_DELEGATE_RBAC_TO_NAMESPACE setting is true, the server panics. This leads to a denial of service for that user, causing request handling to fail until the controller restarts. The impact is limited to loss of service for affected users; it does not allow code execution or data exfiltration.
Affected Systems
The fault affects argoproj’s Argo Workflows, version 4.0.0 through the release immediately preceding 4.0.5. The patch that fixes the issue is published in version 4.0.5 and later releases.
Risk and Exploitability
The CVSS base score of 2.3 signals low severity, and no EPSS data or KEV listing indicates a low likelihood of abuse. Exploitation requires interaction with SSO authentication to trigger the panic, so it is a user-dependent denial of service. While the risk is modest, patching removes the cause of the server crash.
OpenCVE Enrichment
Github GHSA