Unsafe Untar Code in Argo Workflows Affects Kubernetes Deployment
CVE-2025-66626
What is CVE-2025-66626?
Argo Workflows, a widely used open-source container-native workflow engine for Kubernetes, suffers from a vulnerability that affects versions 3.6.13 and earlier, as well as versions 3.7.0 to 3.7.4. This issue arises from flawed handling of symbolic links during the untar process, enabling an attacker to potentially overwrite critical files, such as /var/run/argo/argoexec, with malicious scripts. Upon pod startup, these scripts can execute, resulting in security breaches. Users are encouraged to upgrade to versions 3.6.14 or 3.7.5, where this vulnerability has been effectively addressed.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
argo-workflows github.com/argoproj/argo-workflows/v3 >= 3.7.0, < 3.7.5 < github.com/argoproj/argo-workflows/v3 3.7.0, 3.7.5
argo-workflows github.com/argoproj/argo-workflows/v3 < 3.6.14 < github.com/argoproj/argo-workflows/v3 3.6.14
argo-workflows github.com/argoproj/argo-workflows <= 2.5.3-rc4 <= github.com/argoproj/argo-workflows 2.5.3-rc4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
