The Danger of Incomplete Fixes: How a Patched Vulnerability in Argo Workflows Still Allowed Remote Code Execution

Security researchers discovered a critical vulnerability, CVE-2025-66626, in Argo Workflows by analyzing a previous security patch. The patch for an earlier ZipSlip flaw, CVE-2025-62156, intended to prevent path traversal via symlinks during artifact extraction. However, the fix contained a logical flaw: it validated a constructed safe file path but then used the original, attacker-controlled path to create the symbolic link. This mismatch allowed an attacker to craft a tarball that would create symlinks pointing to sensitive locations outside the secure working directory, such as /etc or /tmp, enabling arbitrary file writes. The researchers further demonstrated that this file write primitive could be exploited for full remote code execution by overwriting a specific initialization file executed when a Kubernetes pod starts. The article emphasizes that security patches should be treated as signals for further review, not as conclusive fixes, and warns against over-relying on framework functions for security boundaries. 

https://www.endorlabs.com/learn/when-a-broken-fix-leads-to-rce-how-we-found-cve-2025-66626-in-argo

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities