Description

A critical vulnerability (CVE-2025-55190, CVSS 10) has been discovered and patched in Argo CD, the popular GitOps continuous delivery platform for Kubernetes. The flaw affects the /api/v1/projects/{project}/detailed endpoint, where API tokens with basic project-level permissions could access sensitive repository credentials—such as usernames and passwords—despite lacking explicit permission to view secrets. The vulnerability allowed tokens with limited roles (e.g., automation roles for syncing or retrieving apps) to call the project details API and obtain credentials for all repositories associated with the project. Even more concerning, this flaw extended beyond project-scoped tokens. According to the advisory, any token with projects get permissions—including global roles—could exploit the issue, exposing secrets unintentionally across environments. The Argo CD team has released fixes in versions v3.1.2, v3.0.14, v2.14.16, and v2.13.9. Exploitation was simple and did not require elevated privileges, making this a high-risk exposure for affected environments. All users are strongly urged to upgrade immediately and review existing tokens, roles, and access control configurations to ensure their systems are not vulnerable to unauthorized secret access.