CVE-2026-42880
Published: 07 May 2026
Description
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. From versions 3.2.0 to before 3.2.11 and 3.3.0 to before 3.3.9, there is a missing authorization and data-masking gap in Argo CD's ServerSideDiff endpoint that allows an attacker with…
more
read-only access to extract plaintext Kubernetes Secret data from etcd via the Kubernetes API server's Server-Side Apply dry-run mechanism. This issue has been patched in versions 3.2.11 and 3.3.9.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
The control's identification, isolation, alerting, and eradication steps directly limit the impact and exploitation window of unauthorized sensitive information exposure.
Proper media downgrading process prevents sensitive information from remaining on media that is then accessible to lower-classification recipients.
Policies requiring periodic review and deletion of inaccurate/outdated PII reduce the amount of sensitive information retained and therefore exposed.
Regular deletion of inaccurate or outdated PII directly reduces the volume of sensitive information retained that could be exposed.
De-identification directly prevents exposure of sensitive/PII data to unauthorized actors when datasets are released or shared.
Deleting information when no longer needed directly reduces the window during which sensitive data can be exposed to unauthorized actors.
Secure disposal techniques directly prevent sensitive data from becoming accessible to unauthorized actors after components leave organizational control.
Automated marking applies security attributes to system outputs, making it harder for attackers to exploit unmarked sensitive information leading to unauthorized exposure.
Security SummaryAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)