CVE-2025-55190: Critical Information Disclosure in Argo CD Project API
Vulnerability ID: GHSA-786Q-9HCG-V9FF
CVSS Score: 9.9
Published: 2025-09-04
Argo CD versions 2.13.0 through 3.1.1 suffer from a critical information disclosure vulnerability (CVSS 9.9) in the Project Details API endpoint. Authenticated attackers with standard project-level read access can bypass intended RBAC restrictions to extract plain-text Git repository passwords and Kubernetes cluster bearer tokens.
TL;DR
Authenticated users with basic projects, get permissions can retrieve unsanitized, plain-text credentials for connected Kubernetes clusters and Git repositories via the /api/v1/projects/{project}/detailed API endpoint due to a missing object sanitization step.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-200
- Attack Vector: Network (AV:N)
- CVSS Score: 9.9 (CRITICAL)
- EPSS Score: 7.12%
- Impact: High (Confidentiality, Integrity, Availability)
- Exploit Status: PoC Available
- KEV Status: Not Listed
Affected Systems
- Argo CD
-
Argo CD: 2.13.0 - 2.13.8 (Fixed in:
2.13.9) -
Argo CD: 2.14.0 - 2.14.15 (Fixed in:
2.14.16) -
Argo CD: 3.0.0 - 3.0.12 (Fixed in:
3.0.14) -
Argo CD: 3.1.0-rc1 - 3.1.1 (Fixed in:
3.1.2)
Code Analysis
Commit: e8f8610
Fix for CVE-2025-55190 implementing whitelist sanitization for Repository and Cluster objects in GetDetailedProject API handler.
Exploit Details
- GitHub (ProjectDiscovery): Nuclei template for detecting plain-text credentials in the Argo CD detailed project endpoint response.
Mitigation Strategies
- Upgrade Argo CD to a patched version (2.13.9, 2.14.16, 3.0.14, 3.1.2).
- Rotate all credentials stored in Argo CD associated with Kubernetes clusters and Git repositories.
- Audit and restrict Argo CD RBAC configurations to limit the assignment of
projects, getpermissions.
Remediation Steps:
- Identify the current version of Argo CD deployed in the environment.
- Update the container image tags or Helm chart versions to point to a patched release (e.g., v3.0.14).
- Deploy the updated Argo CD instance.
- Inventory all Git repository credentials and Kubernetes cluster tokens managed by Argo CD.
- Revoke and regenerate all inventoried credentials at their respective sources (Git provider, Kubernetes clusters).
- Update Argo CD with the newly generated credentials.
- Review the
argocd-rbac-cmConfigMap to ensure minimal privilege assignment for API tokens and users.
References
- GitHub Advisory: GHSA-786q-9hcg-v9ff
- Fix Commit: e8f86101f5378662ae6151ce5c3a76e9141900e8
- NVD Vulnerability Record: CVE-2025-55190
- Nuclei Detection Template
Read the full report for GHSA-786Q-9HCG-V9FF on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)