Unsafe Untar Code in Argo Workflows Affects Kubernetes Deployment
CVE-2025-66626
What is CVE-2025-66626?
Argo Workflows, a widely used open-source container-native workflow engine for Kubernetes, suffers from a vulnerability that affects versions 3.6.13 and earlier, as well as versions 3.7.0 to 3.7.4. This issue arises from flawed handling of symbolic links during the untar process, enabling an attacker to potentially overwrite critical files, such as /var/run/argo/argoexec, with malicious scripts. Upon pod startup, these scripts can execute, resulting in security breaches. Users are encouraged to upgrade to versions 3.6.14 or 3.7.5, where this vulnerability has been effectively addressed.
Affected Version(s)
argo-workflows github.com/argoproj/argo-workflows/v3 >= 3.7.0, < 3.7.5 < github.com/argoproj/argo-workflows/v3 3.7.0, 3.7.5
argo-workflows github.com/argoproj/argo-workflows/v3 < 3.6.14 < github.com/argoproj/argo-workflows/v3 3.6.14
argo-workflows github.com/argoproj/argo-workflows <= 2.5.3-rc4 <= github.com/argoproj/argo-workflows 2.5.3-rc4
