CVE-2025-47933
Argo CD vulnerability analysis and mitigation

Overview

A critical cross-site scripting (XSS) vulnerability (CVE-2025-47933) was discovered in Argo CD, affecting versions from 1.2.0-rc1 through 3.0.3. The vulnerability was disclosed on May 28, 2025, and impacts the repository page functionality of the Argo CD application. This security flaw affects multiple versions of the software including Argo CD v1.x, v2.x, and v3.x series (GitHub Advisory).

Technical details

The vulnerability stems from improper URL protocol filtering in the repository page component. Specifically, the issue exists in the ui/src/app/shared/components/urls.ts file where the code fails to validate repository URL protocols properly. The vulnerability carries a CVSS v3.1 score of 9.1 (Critical), with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H. The technical root cause involves the repoUrl function not validating URL protocols, allowing potential injection of javascript: URLs that can be exploited for XSS attacks (GitHub Advisory).

Impact

The vulnerability allows attackers with repository editing permissions to perform arbitrary actions on behalf of victims through the API. These actions can include creating, modifying, and deleting Kubernetes resources. The high severity rating reflects the potential for significant system compromise through the exploitation of this vulnerability (GitHub Advisory).

Mitigation and workarounds

Patches have been released in Argo CD versions v3.0.4, v2.14.13, and v2.13.8. The fix includes implementing proper URL validation that returns null if validation fails. For unpatched systems, there are no effective workarounds other than relying on browser-based URL filtering (GitHub Advisory, Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management