Home

Description

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Versions 1.2.0 through 1.8.7, 2.0.0-rc1 through 2.14.19, 3.0.0-rc1 through 3.2.0-rc1, 3.1.7 and 3.0.18 are vulnerable to malicious API requests which can crash the API server and cause denial of service to legitimate clients. With the default configuration, no webhook.gogs.secret set, Argo CD’s /api/webhook endpoint will crash the entire argocd-server process when it receives a Gogs push event whose JSON field commits[].repo is not set or is null. This issue is fixed in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19.

PUBLISHED Reserved 2025-09-17 | Published 2025-10-01 | Updated 2025-10-01 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-20: Improper Input Validation

CWE-476: NULL Pointer Dereference

Product status

>= 1.2.0, <= 1.8.7
affected

>= 2.0.0-rc1, < 2.14.20
affected

>= 3.2.0-rc1, < 3.2.0-rc2
affected

>= 3.1.0-rc1, < 3.1.8
affected

>= 3.0.0-rc1, < 3.0.19
affected

References

github.com/...rgo-cd/security/advisories/GHSA-wp4p-9pxh-cgx2

github.com/...ommit/761fc27068d2d4cd24e1f784eb2a9033b5ee7f43

cve.org (CVE-2025-59537)

nvd.nist.gov (CVE-2025-59537)

Download JSON