In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Relative Path Traversal vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/argoproj/argo-workflows/v3/workflow/executor to version 3.7.5, 3.6.14 or higher.
Affected versions of this package are vulnerable to Relative Path Traversal in the untar process. An attacker can execute arbitrary code with elevated privileges by crafting a malicious archive containing symbolic links that overwrite critical files such as /var/run/argo/argoexec, which will be executed at pod startup.
Note:
The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links.