CVE-2025-47933

9.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform cross-site scripting (XSS) attacks in Argo CD's repository page. Attackers with repository edit permissions can inject malicious scripts that execute arbitrary actions on behalf of victims. This affects all Argo CD deployments prior to patched versions.

💻 Affected Systems

Products:
  • Argo CD
Versions: All versions prior to 2.13.8, 2.14.13, and 3.0.4
Operating Systems: All platforms running Argo CD
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have repository edit permissions. Affects all deployment configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with repository edit access can execute arbitrary API calls as authenticated users, potentially compromising Kubernetes clusters, stealing credentials, or deploying malicious workloads.

🟠

Likely Case

Attackers with repository edit permissions can perform unauthorized actions within the victim's permissions scope, such as modifying applications, accessing sensitive data, or escalating privileges.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is limited to users with repository edit permissions, reducing impact to authorized actions only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires repository edit permissions. The vulnerability is in URL protocol filtering, making XSS relatively straightforward for attackers with access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.13.8, 2.14.13, or 3.0.4

Vendor Advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-2hj5-g64g-fp6p

Restart Required: Yes

Instructions:

1. Identify your current Argo CD version. 2. Upgrade to 2.13.8, 2.14.13, or 3.0.4 based on your major version. 3. Restart Argo CD components. 4. Verify the fix by checking version and testing repository functionality.

🔧 Temporary Workarounds

Restrict Repository Edit Permissions

all

Limit repository edit permissions to trusted users only to reduce attack surface.

Implement WAF Rules

all

Deploy web application firewall rules to detect and block XSS attempts in repository URLs.

🧯 If You Can't Patch

  • Implement strict RBAC to limit repository edit permissions to essential personnel only.
  • Monitor for suspicious repository modifications and implement alerting for unusual patterns.

🔍 How to Verify

Check if Vulnerable:

Check Argo CD version. If version is below 2.13.8, 2.14.13, or 3.0.4, the system is vulnerable.

Check Version:

argocd version --client

Verify Fix Applied:

After patching, verify version is 2.13.8, 2.14.13, or 3.0.4 or higher. Test repository functionality to ensure proper URL filtering.

📡 Detection & Monitoring

Log Indicators:

  • Unusual repository modifications
  • Suspicious URL patterns in repository configurations
  • Multiple failed authentication attempts followed by repository edits

Network Indicators:

  • Unusual API calls from repository management endpoints
  • Suspicious JavaScript payloads in HTTP requests

SIEM Query:

source="argo-cd" AND ("repository" OR "repo") AND ("javascript:" OR "data:" OR unusual URL patterns)

🔗 References

📤 Share & Export