CVE-2021-37914

Medium
|6.5
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker can disrupt workflows in Argo Workflows if they are allowed to input parameters while the EXPRESSION_TEMPLATES feature is enabled. This vulnerability occurs when untrusted users can influence the output of expression templates, potentially leading to unexpected behavior in the workflow.

Technical Description

In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactLow
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$931($500-$1K)
Vendor Response
Grade FPatched in 1655 days

Quick Information

Published

Aug 3, 2021

over 4 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

argoproj

Product

argo workflows