<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Secret-Extraction — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/secret-extraction/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 01:56:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/secret-extraction/feed.xml" rel="self" type="application/rss+xml"/><item><title>ArgoCD ServerSideDiff Secret Extraction Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-argocd-secret-extraction/</link><pubDate>Thu, 07 May 2026 01:56:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-argocd-secret-extraction/</guid><description>A missing authorization and data-masking gap in Argo CD's ServerSideDiff endpoint allows an attacker with read-only access to extract plaintext Kubernetes Secret data from etcd via the Kubernetes API server's Server-Side Apply dry-run mechanism, affecting versions v3.2.0-v3.2.10 and v3.3.0-v3.3.8.</description><content:encoded><![CDATA[<p>A vulnerability exists in Argo CD&rsquo;s ServerSideDiff endpoint that allows for the extraction of plaintext Kubernetes Secret data. The vulnerability stems from a missing authorization and data-masking gap in the <code>/application.ApplicationService/ServerSideDiff</code> endpoint. This allows an attacker with read-only access to extract plaintext Kubernetes Secret data from etcd via the Kubernetes API server&rsquo;s Server-Side Apply dry-run mechanism. The issue affects Argo CD versions v3.2.0 through v3.2.10 and v3.3.0 through v3.3.8. Exploitation is possible by any user with Argo CD application get permissions, potentially exposing sensitive information such as service account tokens, TLS certificates, database credentials, and API keys. The impact is heightened when the <code>IncludeMutationWebhook=true</code> annotation is set on Applications, as this bypasses a defense layer and makes exploitation easier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to Argo CD with read-only access or leverages existing access.</li>
<li>Attacker identifies an Argo CD Application with the <code>argocd.argoproj.io/compare-options: IncludeMutationWebhook=true</code> annotation.</li>
<li>Attacker identifies Kubernetes Secrets managed by Argo CD within the targeted Application.</li>
<li>Attacker crafts a malicious request to the <code>/application.ApplicationService/ServerSideDiff</code> endpoint, targeting the identified Secret.  The request simulates a server-side dry-run apply operation.</li>
<li>The <code>ServerSideDiff</code> function, due to the <code>IncludeMutationWebhook=true</code> setting, skips the <code>removeWebhookMutation()</code> defense, which would normally mask sensitive data.</li>
<li>The Kubernetes API server processes the dry-run request, retrieving the unmasked Secret data from etcd.</li>
<li>The raw, unmasked Secret data is included in the API response to the attacker.</li>
<li>Attacker parses the response, extracts the plaintext Secret data, and uses it for unauthorized access or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows any user with Argo CD application get permissions to extract real Kubernetes Secret values. This can lead to the exposure of sensitive data, including service account tokens, TLS certificates, database credentials, and API keys. Depending on the permissions associated with the compromised secrets, attackers can gain unauthorized access to other systems, escalate privileges, or perform lateral movement within the Kubernetes cluster. The vulnerability affects Argo CD versions between 3.2.0 and 3.2.11 and between 3.3.0 and 3.3.9.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Argo CD to version v3.2.11 or v3.3.9 or later to patch CVE-2026-42880.</li>
<li>Review Argo CD Applications for the presence of the <code>argocd.argoproj.io/compare-options: IncludeMutationWebhook=true</code> annotation and remove it where not strictly necessary.</li>
<li>Deploy the Sigma rule <code>Detect ArgoCD ServerSideDiff Secret Extraction Attempt</code> to detect suspicious requests to the <code>/application.ApplicationService/ServerSideDiff</code> endpoint.</li>
<li>Monitor Argo CD logs for unusual activity related to the <code>ServerSideDiff</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>argocd</category><category>secret-extraction</category><category>kubernetes</category><category>credential-access</category></item></channel></rss>