Description
A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.
Problem types
Incorrect Privilege Assignment
Product status
Any version before 1.16.2
sha256:bcc192e3e9ff8dfd15bd311fdeda919653721e85338c96d5ad29fa6f1e4e3365 (rpm) before *
sha256:27e7a59bb5c5f60be7509e5f4f07f4181d62e6583a943c46f56f568bfc30c2c1 (rpm) before *
sha256:3eb6308c58365182b4b5b5aabf35754d821e25b8a04b0595900fb47d52cd3ecc (rpm) before *
Timeline
| 2025-12-02: | Reported to Red Hat. |
| 2025-12-15: | Made public. |
References
access.redhat.com/errata/RHSA-2025:23203 (RHSA-2025:23203)
access.redhat.com/errata/RHSA-2025:23206 (RHSA-2025:23206)
access.redhat.com/errata/RHSA-2025:23207 (RHSA-2025:23207)
access.redhat.com/security/cve/CVE-2025-13888
bugzilla.redhat.com/show_bug.cgi?id=2418361 (RHBZ#2418361)
github.com/...ommit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef
github.com/redhat-developer/gitops-operator/pull/897
github.com/...developer/gitops-operator/releases/tag/v1.16.2
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.