
We found results for “”
CVE-2025-59538
Good to know:


Date: October 1, 2025
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. For versions 2.9.0-rc1 through 2.14.19, 3.0.0-rc1 through 3.2.0-rc1, 3.1.6 and 3.0.17, when the webhook.azuredevops.username and webhook.azuredevops.password are not set in the default configuration, the /api/webhook endpoint crashes the entire argocd-server process when it receives an Azure DevOps Push event whose JSON array resource.refUpdates is empty. The slice index [0] is accessed without a length check, causing an index-out-of-range panic. A single unauthenticated HTTP POST is enough to kill the process. This issue is resolved in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version github.com/argoproj/argo-cd/v2 - v2.14.20;github.com/argoproj/argo-cd/v3 - v3.2.0-rc2;github.com/argoproj/argo-cd/v3 - v3.1.8;github.com/argoproj/argo-cd/v3 - v3.0.19;https://github.com/argoproj/argo-cd.git - v3.1.8;https://github.com/argoproj/argo-cd.git - v3.0.19;https://github.com/argoproj/argo-cd.git - v3.2.0-rc2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |