Home

Description

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a workflow pod carries a malformed workflows.argoproj.io/pod-gc-strategy annotation. Because the panic occurs inside an informer goroutine (outside the controller's recover() scope), it crashes the entire controller process. The poisoned pod persists across restarts, causing a crash loop that halts all workflow processing until the pod is manually deleted. This vulnerability is fixed in 4.0.5 and 3.7.14.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-23 | Updated 2026-04-25 | Assigner GitHub_M




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Problem types

CWE-129: Improper Validation of Array Index

Product status

>= 4.0.0, < 4.0.5
affected

>= 3.7.0, < 3.7.14
affected

>= 3.6.5, <= 3.6.19
affected

References

github.com/...kflows/security/advisories/GHSA-5jv8-h7qh-rf5p exploit

github.com/...kflows/security/advisories/GHSA-5jv8-h7qh-rf5p

cve.org (CVE-2026-40886)

nvd.nist.gov (CVE-2026-40886)

Download JSON