CVE-2026-28229 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 11, 2026
Argo Workflows - Information Disclosure
Overview
Argo Workflows < 4.0.2 and < 3.7.11 contain an information disclosure vulnerability caused by improper authorization in Workflow templates endpoints, letting unauthenticated attackers retrieve sensitive template content including embedded secrets, exploit requires no valid authorization token.
Severity & Score
Impact
Unauthenticated attackers can access sensitive workflow templates and embedded secrets, leading to information disclosure.
Mitigation
Update to versions 4.0.2 or 3.7.11 or later.
Social Media Activity(1 post)
š“ CVE-2026-28229 - Critical (9.8) Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates).... š https://www.thehackerwire.com/vulnerability/CVE-2026-28229/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28229
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_access_control
- Status
- new
- EPSS
- 4.1%
- Social Posts
- 1
CWE
- CWE-863
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H