Jan 6, 2026·6 min read·26 visits
Improper protocol sanitization in Argo CD's repository management UI allows a malicious actor to inject `javascript:` payloads into repository URLs. When an administrator clicks the link, the payload executes, granting the attacker full control over the Argo CD API and the managed Kubernetes clusters. Patch immediately to 2.13.8+, 2.14.13+, or 3.0.4+.
A critical Stored Cross-Site Scripting (XSS) vulnerability in the Argo CD web interface allows attackers with repository edit permissions to execute arbitrary JavaScript in the context of other users, potentially leading to full Kubernetes cluster compromise via the API.
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Argo CD Argo Project | >= 1.2.0-rc1, <= 1.8.7 | N/A (End of Life) |
Argo CD Argo Project | >= 2.0.0-rc3, < 2.13.8 | 2.13.8 |
Argo CD Argo Project | >= 2.14.0-rc1, < 2.14.13 | 2.14.13 |
Argo CD Argo Project | >= 3.0.0-rc1, < 3.0.4 | 3.0.4 |
| Attribute | Detail |
|---|---|
| CVE ID | CVE-2025-47933 |
| CVSS v3.1 | 9.1 (Critical) |
| Attack Vector | Network (Stored XSS) |
| CWE | CWE-79 (Improper Neutralization of Input) |
| Impact | RCE / Cluster Compromise |
| Authentication | Required (Low Privilege) |
| EPSS Score | 0.00011 (Low probability) |
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.