CVE-2025-62157: Argo Workflow may expose artifact repository credentials
An attacker who has permissions to read logs from pods in a namespace with Argo Workflow can read workflow-controller logs and get credentials to the artifact repository.
References
- github.com/advisories/GHSA-c2hv-4pfj-mm2r
- github.com/argoproj/argo-workflows
- github.com/argoproj/argo-workflows/commit/18ad5138b6bcb2aba04e00b4ec657bc6b8fad8df
- github.com/argoproj/argo-workflows/commit/bded09fe4abd37cb98d7fc81b4c14a6f5034e9ab
- github.com/argoproj/argo-workflows/security/advisories/GHSA-c2hv-4pfj-mm2r
- nvd.nist.gov/vuln/detail/CVE-2025-62157
Code Behaviors & Features
Detect and mitigate CVE-2025-62157 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →