<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Argo Workflows &lt; 3.7.14 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/argo-workflows--3.7.14/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 20:11:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/argo-workflows--3.7.14/feed.xml" rel="self" type="application/rss+xml"/><item><title>Argo Workflows Webhook Interceptor Vulnerable to Unauthenticated Memory Exhaustion (CVE-2026-42294)</title><link>https://feed.craftedsignal.io/briefs/2026-05-argo-dos/</link><pubDate>Mon, 04 May 2026 20:11:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-argo-dos/</guid><description>Argo Workflows is vulnerable to a denial-of-service (DoS) attack due to unbounded memory allocation in the Webhook Interceptor component.</description><content:encoded><![CDATA[<p>Argo Workflows is vulnerable to a denial-of-service (DoS) attack (CVE-2026-42294) due to unbounded memory allocation in the Webhook Interceptor. The vulnerability resides in the <code>server/auth/webhook/interceptor.go</code> component, specifically within the <code>/api/v1/events/</code> endpoint. This endpoint, intended for webhook integrations, reads the entire request body into memory without proper size limits, leading to potential memory exhaustion. An attacker can exploit this vulnerability by sending a crafted request with an extremely large body, causing the Argo Server to allocate excessive memory and potentially crash, resulting in a denial of service. Affected versions include Argo Workflows versions prior to 3.7.14 and versions 4.0.0 up to 4.0.5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Argo Workflows instance with a publicly accessible <code>/api/v1/events/</code> endpoint.</li>
<li>The attacker crafts an HTTP POST request targeting the <code>/api/v1/events/</code> endpoint.</li>
<li>The attacker sets the <code>Content-Length</code> header of the request to a very large value (e.g., 1GB or more).</li>
<li>The attacker sends the malicious request with a large amount of arbitrary data as the request body.</li>
<li>The Argo Server receives the request and, within the <code>WebhookInterceptor</code>, calls <code>io.ReadAll(r.Body)</code>, allocating memory to store the entire request body.</li>
<li>Due to the large request body, the Argo Server&rsquo;s memory consumption increases significantly.</li>
<li>If the attacker sends a sufficiently large request, the Argo Server exhausts its available memory.</li>
<li>The Argo Server process crashes due to an Out-Of-Memory (OOM) error, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, disrupting workflow execution and API access for all users of the Argo Workflows instance. The Argo Server crashes, making it unavailable until restarted. This impacts service availability and potentially causes data loss if workflows are interrupted during execution. The number of victims depends on the number of Argo Workflows instances exposed and targeted by attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enforce a strict limit on webhook body size (e.g., 10MB) using <code>http.MaxBytesReader</code> or similar mechanisms within your ingress controller or reverse proxy to prevent oversized requests from reaching the Argo Server.</li>
<li>Upgrade Argo Workflows to version 3.7.14 or 4.0.5 or later to patch CVE-2026-42294 and mitigate the risk of denial-of-service attacks.</li>
<li>Monitor memory usage of the Argo Server process and set up alerts for unusually high memory consumption to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>argo-workflows</category><category>cloud</category></item></channel></rss>