Article Details
Scrape Timestamp (UTC): 2025-09-05 15:30:43.529
Original Article Text
Click to Toggle View
Max severity Argo CD API flaw leaks repository credentials. An Argo CD vulnerability allows API tokens with even low project-level get permissions to access API endpoints and retrieve all repository credentials associated with the project. The flaw, tracked under CVE-2025-55190, is rated with the maximum severity score of 10.0 in CVSS v3, and allows bypassing isolation mechanisms used to protect sensitive credential information. Attackers holding those credentials could then use them to clone private codebases, inject malicious manifests, attempt downstream compromise, or pivot to other resources where the same credentials are reused. Argo CD is a Kubernetes-native continuous deployment (CD) and GitOps tool used by numerous organizations, including large enterprises such as Adobe, Google, IBM, Intuit, Red Hat, Capital One, and BlackRock, which use it for handling large-scale, mission-critical deployments. The newly discovered vulnerability impacts all versions of Argo CD up to 2.13.0. "Argo CD API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets," reads the bulletin published on the project's GitHub. "API tokens should require explicit permission to access sensitive credential information," adds the bulletin on another part, also noting that "Standard project permissions should not grant access to repository secrets." The disclosure demonstrates that low-level tokens can retrieve a repository's username and password. The attack still requires a valid Argo CD API token, so it is not exploitable by unauthenticated users. However, low-privileged users could use them to gain access to sensitive data that should not usually be accessible. "This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: p, role/user, projects, get, *, allow," warns the Argo Project. Due to the wide breadth of low-privileged tokens that can exploit this flaw, the opportunity for threat actors to gain access to a token increases. Given Argo CD's widespread deployment in production clusters by major enterprises, the direct credential exposure and low barrier to exploitation make the flaw particularly dangerous, potentially leading to code theft, extortion, and supply chain attacks. Ashish Goyal discovered the CVE-2025-55190 flaw, and it has been fixed in Argo CD versions 3.1.2, 3.0.14, 2.14.16, and 2.13.9, so administrators of potentially impacted systems are recommended to move to one of these versions as soon as possible. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
A critical vulnerability in Argo CD, CVE-2025-55190, allows API tokens with low permissions to access repository credentials, posing significant risks to organizations using this tool.
The flaw holds a maximum severity score of 10.0 in CVSS v3, enabling attackers to bypass isolation mechanisms and potentially clone codebases or inject malicious content.
Affected organizations include major enterprises like Adobe, Google, and IBM, which rely on Argo CD for large-scale deployments, heightening the potential impact of this vulnerability.
Exploitation requires a valid Argo CD API token but does not require high-level permissions, increasing the risk of unauthorized access to sensitive data.
The vulnerability affects all versions of Argo CD up to 2.13.0, with fixes available in versions 3.1.2, 3.0.14, 2.14.16, and 2.13.9, urging immediate updates.
The exposure could lead to serious threats, including code theft, extortion, and supply chain attacks, making prompt remediation essential for affected enterprises.
Administrators are advised to update to the patched versions immediately to mitigate the risk and protect sensitive credentials from potential exploitation.