Advisory

Critical Argo CD vulnerability exposes repository credentials through API token exploitation

Take action: If you're using Argo CD, consider this an urgent advisory, since your secrets can be extracted by anyone with a token (regardless of permissions). Upgrade to the latest patched version (v3.1.2, v3.0.14, v2.14.16, or v2.13.9) to fix CVE-2025-55190. Isolation and reducing of tokens may help, but you still must partch. Quickly.


Learn More

A critical security vulnerability has been discovered in Argo CD, a GitOps continuous delivery tool for Kubernetes that allows API tokens with basic project-level permissions to retrieve sensitive repository credentials including usernames and passwords. 

The flaw is tracked as CVE-2025-55190 (CVSS score 10) and is caused from improper access control enforcement within the Project API's detailed endpoint /api/v1/projects/{project}/detailed. It allows authenticated users with limited project permissions to access repository secrets that should require explicit authorization. Even general-purpose tokens designed for routine operations can be exploited to harvest sensitive credentials.

The vulnerability impacts versions 

  • 2.13.0 through 2.13.8,  
  • 2.14.0 through 2.14.15,
  • 3.0.0 through 3.0.12,
  • 3.1.0-rc1 through 3.1.1. 

Organizations should immediately upgrade to one of the following patched versions: v3.1.2, v3.0.14, v2.14.16, or v2.13.9. 

Organizations that can't upgrade should implement additional security measures like restricting API token permissions, implementing network-level access controls, and monitoring for unusual API access patterns. These measures don't remove the heed to patch the system.

Critical Argo CD vulnerability exposes repository credentials through API token exploitation