TopVuln

High-risk vulnerability digests

CVE-2026-42297

  • HIGH

Details

CVSS v4
8.5
NVD published
2026-05-09 04:16:25
Affected versions
4.0.0 to < 4.0.5
Summary
The Argo Workflows Sync Service's ConfigMap-backed provider performs no authorization checks for any create, read, update, or delete operations. Any authenticated user, even those using invalid fake Bearer tokens, can modify synchronization limit ConfigMaps. This can lead to workflow scheduling disruption and unintended cluster configuration changes.
Remediation
Upgrade Argo Workflows to the patched version 4.0.5 as soon as possible. Restrict network access to the Argo Sync Service endpoint to only trusted administrative clients until the upgrade can be completed.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.