Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CRs allow the corresponding orchestrated pod to be customized with spec.template and spec.template.container (with type k8s.io/api/core/v1.Container), thus, any specification under container such as command, args, securityContext , volumeMount can be specified, and applied to the EventSource or Sensor pod. With these, a user would be able to gain privileged access to the cluster host, if he/she specified the EventSource/Sensor CR with some particular properties under template. This vulnerability is fixed in v1.9.6.
History

Wed, 16 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-268
References
Metrics threat_severity

None

threat_severity

Critical


Tue, 15 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Apr 2025 19:30:00 +0000

Type Values Removed Values Added
Description Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CRs allow the corresponding orchestrated pod to be customized with spec.template and spec.template.container (with type k8s.io/api/core/v1.Container), thus, any specification under container such as command, args, securityContext , volumeMount can be specified, and applied to the EventSource or Sensor pod. With these, a user would be able to gain privileged access to the cluster host, if he/she specified the EventSource/Sensor CR with some particular properties under template. This vulnerability is fixed in v1.9.6.
Title Users can gain privileged access to the host system and cluster with EventSource and Sensor CR
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-15T20:07:10.640Z

Reserved: 2025-04-08T10:54:58.369Z

Link: CVE-2025-32445

cve-icon Vulnrichment

Updated: 2025-04-15T20:07:07.577Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-15T20:15:39.807

Modified: 2025-04-16T13:25:59.640

Link: CVE-2025-32445

cve-icon Redhat

Severity : Critical

Publid Date: 2025-04-14T17:47:39Z

Links: CVE-2025-32445 - Bugzilla