Home

Description

A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.

PUBLISHED Reserved 2025-12-02 | Published 2025-12-15 | Updated 2025-12-24 | Assigner redhat




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

Incorrect Privilege Assignment

Product status

Default status
unaffected

Any version before 1.16.2
affected

Default status
affected

sha256:bcc192e3e9ff8dfd15bd311fdeda919653721e85338c96d5ad29fa6f1e4e3365 (rpm) before *
unaffected

Default status
affected

sha256:27e7a59bb5c5f60be7509e5f4f07f4181d62e6583a943c46f56f568bfc30c2c1 (rpm) before *
unaffected

Default status
affected

sha256:3eb6308c58365182b4b5b5aabf35754d821e25b8a04b0595900fb47d52cd3ecc (rpm) before *
unaffected

Default status
unaffected

Timeline

2025-12-02:Reported to Red Hat.
2025-12-15:Made public.

References

access.redhat.com/errata/RHSA-2025:23203 (RHSA-2025:23203) vendor-advisory

access.redhat.com/errata/RHSA-2025:23206 (RHSA-2025:23206) vendor-advisory

access.redhat.com/errata/RHSA-2025:23207 (RHSA-2025:23207) vendor-advisory

access.redhat.com/security/cve/CVE-2025-13888 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2418361 (RHBZ#2418361) issue-tracking

github.com/...ommit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef

github.com/redhat-developer/gitops-operator/pull/897

github.com/...developer/gitops-operator/releases/tag/v1.16.2

cve.org (CVE-2025-13888)

nvd.nist.gov (CVE-2025-13888)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.