| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3775-99mw-8rp4 | Argo has incomplete fix for CVE-2026-31892: hostNetwork, securityContext, serviceAccountName bypass templateReferencing Strict/Secure |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Argoproj
Argoproj argo-workflows |
|
| Vendors & Products |
Argoproj
Argoproj argo-workflows |
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to versions 3.7.14 and 4.0.5, a user with create Workflow permission can bypass templateReferencing: Strict to get host network access, switch service accounts, override pod security context, add tolerations to schedule on control-plane nodes, or enable SA token mounting. This defeats the stated purpose of the feature. The practical impact depends on what Kubernetes-level controls are in place. Clusters with PodSecurity admission or OPA/Gatekeeper would independently block some of these (like hostNetwork). Clusters that rely on Argo's Strict mode as the primary enforcement layer are fully exposed. This issue has been patched in versions 3.7.14 and 4.0.5. | |
| Title | Argo Workflows has incomplete fix for CVE-2026-31892: hostNetwork, securityContext, serviceAccountName bypass templateReferencing Strict/Secure | |
| Weaknesses | CWE-863 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T18:31:15.581Z
Reserved: 2026-04-26T12:13:55.552Z
Link: CVE-2026-42296
Updated: 2026-05-12T17:51:20.962Z
Status : Undergoing Analysis
Published: 2026-05-09T04:16:25.563
Modified: 2026-05-12T19:16:32.817
Link: CVE-2026-42296
No data.
OpenCVE Enrichment
Updated: 2026-05-09T05:30:16Z
Github GHSA