Bypass of Security Settings in Argo Workflows by Users Submitting Workflows
CVE-2026-31892

8.9HIGH

Key Information:

Vendor

Argoproj

Vendor
CVE Published:
11 March 2026

What is CVE-2026-31892?

Argo Workflows, a widely used open source container-native workflow engine designed for Kubernetes, is affected by a vulnerability that allows users to bypass security settings defined in a WorkflowTemplate. This occurs when users include a podSpecPatch field during their Workflow submission, allowing the payload to override the administrator-approved template settings, even when templateReferencing is set to Strict. As a result, there is a risk of executing workflows with altered specifications without proper validation, potentially leading to unauthorized actions. This vulnerability has been addressed in versions 4.0.2 and 3.7.11.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

argo-workflows >= 4.0.0, < 4.0.2 < 4.0.0, 4.0.2

argo-workflows >= 2.9.0, < 3.7.11 < 2.9.0, 3.7.11

References

CVSS V4

Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.