Vulnerability Description
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a workflow pod carries a malformed workflows.argoproj.io/pod-gc-strategy annotation. Because the panic occurs inside an informer goroutine (outside the controller's recover() scope), it crashes the entire controller process. The poisoned pod persists across restarts, causing a crash loop that halts all workflow processing until the pod is manually deleted. This vulnerability is fixed in 4.0.5 and 3.7.14.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Argoproj | Argo Workflows | >= 3.6.5, <= 3.6.19 |
Related Weaknesses (CWE)
References
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-5jv8-h7qh-rfExploitVendor Advisory
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-5jv8-h7qh-rfExploitVendor Advisory
FAQ
What is CVE-2026-40886?
CVE-2026-40886 is a vulnerability with a CVSS score of 7.7 (HIGH). Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() func...
How severe is CVE-2026-40886?
CVE-2026-40886 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40886?
Check the references section above for vendor advisories and patch information. Affected products include: Argoproj Argo Workflows.