Miggo Logo

CVE-2025-62157: Argo Workflow may expose artifact repository credentials

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
10/14/2025
Updated
10/14/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/argoproj/argo-workflows/v3go>= 3.7.0, < 3.7.33.7.3
github.com/argoproj/argo-workflows/v3go< 3.6.123.6.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists because the updateConfig function within the WorkflowController logs the entire application configuration, which includes sensitive credentials for the artifact repository. The analysis of the provided patches confirms this. Both commits, 18ad5138b6bcb2aba04e00b4ec657bc6b8fad8df and bded09fe4abd37cb98d7fc81b4c14a6f5034e9ab, modify the workflow/controller/config.go file. The change in both patches is the removal of the line log.Info("Configuration:\n" + string(bytes)), which was responsible for logging the marshalled configuration data. This line is replaced with a non-sensitive message, log.Info("Configuration updated"). This indicates that the updateConfig function, when called in a vulnerable version, would log the credentials, making it the primary vulnerable function. An attacker who can view the logs of the workflow-controller pod could exploit this to gain unauthorized access to the artifact repository.

Vulnerable functions

WorkflowController.updateConfig
workflow/controller/config.go
The function `updateConfig` in `WorkflowController` was logging the entire workflow controller configuration by marshaling the `wfc.Config` object into YAML and printing it. This configuration object contained sensitive credentials for the artifact repository in plaintext. An attacker with permissions to read the `workflow-controller` logs could therefore steal these credentials.

WAF Protection Rules

WAF Rule

### Summ*ry *n *tt**k*r w*o **s p*rmissions to r*** lo*s *rom po*s in * n*m*sp*** wit* *r*o Work*low **n r*** `work*low-*ontroll*r` lo*s *n* **t *r***nti*ls to t** *rti***t r*pository. ### **t*ils *n *tt**k*r, *y r***in* t** lo*s o* t** work*low *on

Reasoning

T** vuln*r**ility *xists ****us* t** `up**t**on*i*` *un*tion wit*in t** `Work*low*ontroll*r` lo*s t** *ntir* *ppli**tion *on*i*ur*tion, w*i** in*lu**s s*nsitiv* *r***nti*ls *or t** *rti***t r*pository. T** *n*lysis o* t** provi*** p*t***s *on*irms t*