CVE-2026-42295 PUBLISHED

Argo Workflows: Exposure of artifact repository credentials

Assigner: GitHub_M
Reserved: 26.04.2026 Published: 09.05.2026 Updated: 09.05.2026

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From version 4.0.0 to before version 4.0.5, the workflow executor logs all artifact repository credentials (S3 access keys, secret keys, GCS service account keys, Azure account keys, Git passwords, etc.) in plaintext on artifact operation. Any user with read access to workflow pod logs can extract these credentials. This issue has been patched in version 4.0.5.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.5

Product Status

Vendor argoproj
Product argo-workflows
Versions
  • Version >= 4.0.0, < 4.0.5 is affected

References

Problem Types

  • CWE-522: Insufficiently Protected Credentials CWE