Overview
CVE-2025-32445 reveals a critical security flaw in Argo Events, an event-driven workflow automation framework for Kubernetes. The vulnerability allows users with limited privileges to escalate access and gain control over the host system and the entire Kubernetes cluster.
Technical Details
The issue arises from the way EventSource and Sensor custom resources (CRs) are handled. Users with permission to create or modify these resources can manipulate the spec.template
and spec.template.container
fields—based on the k8s.io/api/core/v1.Container
type.
This means arbitrary container properties, such as command
, args
, securityContext
, and volumeMount
, can be specified. By crafting malicious CRs, an attacker could launch pods with elevated privileges, enabling host-level access and control over the cluster.
The vulnerability is categorized under CWE-250: Execution with Unnecessary Privileges. It demonstrates how insufficient restriction on customization of Kubernetes resources can expose systems to severe privilege escalation risks.
Severity and CVSS
According to the CVSS 3.1 scoring system, this vulnerability has a base score of 10.0 (Critical), indicating maximum severity. The CVSS vector is:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Confidentiality, Integrity, Availability: High
This indicates a low barrier to exploitation with a highly impactful result, making immediate remediation essential.
Affected Versions
This vulnerability affects all versions of Argo Events prior to v1.9.6. The issue has been fixed in version 1.9.6, which introduces stricter controls around custom resource specifications.
Recommendations
- Upgrade to Argo Events v1.9.6 or later immediately.
- Review user permissions for EventSource and Sensor CRs to ensure only trusted users can modify them.
- Audit existing CR definitions for signs of abuse or unexpected configurations.
Conclusion
CVE-2025-32445 exemplifies how misconfigured permissions and overly flexible resource definitions in Kubernetes environments can lead to critical privilege escalation. Organizations using Argo Events should treat this vulnerability as a high-priority security concern and act swiftly to secure their clusters.
More details can be found in the official advisory: GitHub Security Advisory