Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/argoproj/argo-workflows/v3
  4. ›
  5. CVE-2025-62157

CVE-2025-62157: Argo Workflow may expose artifact repository credentials

October 14, 2025

An attacker who has permissions to read logs from pods in a namespace with Argo Workflow can read workflow-controller logs and get credentials to the artifact repository.

References

  • github.com/advisories/GHSA-c2hv-4pfj-mm2r
  • github.com/argoproj/argo-workflows
  • github.com/argoproj/argo-workflows/commit/18ad5138b6bcb2aba04e00b4ec657bc6b8fad8df
  • github.com/argoproj/argo-workflows/commit/bded09fe4abd37cb98d7fc81b4c14a6f5034e9ab
  • github.com/argoproj/argo-workflows/security/advisories/GHSA-c2hv-4pfj-mm2r
  • nvd.nist.gov/vuln/detail/CVE-2025-62157

Code Behaviors & Features

Detect and mitigate CVE-2025-62157 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.6.12, all versions starting from 3.7.0 before 3.7.3

Fixed versions

  • 3.7.3
  • 3.6.12

Solution

Upgrade to versions 3.6.12, 3.7.3 or above.

Weakness

  • CWE-522: Insufficiently Protected Credentials

Source file

go/github.com/argoproj/argo-workflows/v3/CVE-2025-62157.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 25 Oct 2025 12:20:29 +0000.