CVE-2025-13888: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources
(updated )
A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.
References
- access.redhat.com/errata/RHSA-2025:23203
- access.redhat.com/errata/RHSA-2025:23206
- access.redhat.com/errata/RHSA-2025:23207
- access.redhat.com/security/cve/CVE-2025-13888
- bugzilla.redhat.com/show_bug.cgi?id=2418361
- github.com/advisories/GHSA-pcqx-8qww-7f4v
- github.com/redhat-developer/gitops-operator
- nvd.nist.gov/vuln/detail/CVE-2025-13888
Code Behaviors & Features
Detect and mitigate CVE-2025-13888 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →