Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. For versions 2.9.0-rc1 through 2.14.19, 3.0.0-rc1 through 3.2.0-rc1, 3.1.6 and 3.0.17, when the webhook.azuredevops.username and webhook.azuredevops.password are not set in the default configuration, the /api/webhook endpoint crashes the entire argocd-server process when it receives an Azure DevOps Push event whose JSON array resource.refUpdates is empty. The slice index [0] is accessed without a length check, causing an index-out-of-range panic. A single unauthenticated HTTP POST is enough to kill the process. This issue is resolved in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19.
References
| Link | Resource |
|---|---|
| https://github.com/argoproj/argo-cd/commit/1a023f1ca7fe4ec942b4b6696804988d5a632baf | Patch |
| https://github.com/argoproj/argo-cd/security/advisories/GHSA-gpx4-37g2-c8pv | Exploit Vendor Advisory |
| https://github.com/argoproj/argo-cd/security/advisories/GHSA-gpx4-37g2-c8pv | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Oct 2025, 14:28
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* cpe:2.3:a:argoproj:argo_cd:3.2.0:rc1:*:*:*:*:*:* |
|
| References | () https://github.com/argoproj/argo-cd/commit/1a023f1ca7fe4ec942b4b6696804988d5a632baf - Patch | |
| References | () https://github.com/argoproj/argo-cd/security/advisories/GHSA-gpx4-37g2-c8pv - Exploit, Vendor Advisory | |
| First Time |
Argoproj
Argoproj argo Cd |
02 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/argoproj/argo-cd/security/advisories/GHSA-gpx4-37g2-c8pv - |
01 Oct 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 21:16
Updated : 2025-10-07 14:28
NVD link : CVE-2025-59538
Mitre link : CVE-2025-59538
CVE.ORG link : CVE-2025-59538
JSON object : View
Products Affected
argoproj
- argo_cd
