Home

Description

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Versions 1.2.0 through 1.8.7, 2.0.0-rc1 through 2.14.19, 3.0.0-rc1 through 3.2.0-rc1, 3.1.7 and 3.0.18 are vulnerable to malicious API requests which can crash the API server and cause denial of service to legitimate clients. Without a configured webhook.bitbucketserver.secret, Argo CD's /api/webhook endpoint crashes when receiving a malformed Bitbucket Server payload (non-array repository.links.clone field). A single unauthenticated request triggers CrashLoopBackOff, and targeting all replicas causes complete API outage. This issue is fixed in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19.

PUBLISHED Reserved 2025-09-17 | Published 2025-10-01 | Updated 2025-10-01 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-703: Improper Check or Handling of Exceptional Conditions

Product status

>= 1.2.0, <= 1.8.7
affected

>= 2.0.0-rc1, < 2.14.20
affected

>= 3.2.0-rc1, < 3.2.0-rc2
affected

>= 3.1.0-rc1, < 3.1.8
affected

>= 3.0.0-rc1, < 3.0.19
affected

References

github.com/...rgo-cd/security/advisories/GHSA-f9gq-prrc-hrhc

github.com/...ommit/5c466a4e39802e059e75c0008ae7b7b8e842538f

cve.org (CVE-2025-59531)

nvd.nist.gov (CVE-2025-59531)

Download JSON