Cyber Posture

CVE-2026-42880

Critical

Published: 07 May 2026

Published
07 May 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0003 8.8th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. From versions 3.2.0 to before 3.2.11 and 3.3.0 to before 3.3.9, there is a missing authorization and data-masking gap in Argo CD's ServerSideDiff endpoint that allows an attacker with…

more

read-only access to extract plaintext Kubernetes Secret data from etcd via the Kubernetes API server's Server-Side Apply dry-run mechanism. This issue has been patched in versions 3.2.11 and 3.3.9.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-200 CWE-212

The control's identification, isolation, alerting, and eradication steps directly limit the impact and exploitation window of unauthorized sensitive information exposure.

addresses: CWE-200 CWE-212

Proper media downgrading process prevents sensitive information from remaining on media that is then accessible to lower-classification recipients.

addresses: CWE-200 CWE-212

Policies requiring periodic review and deletion of inaccurate/outdated PII reduce the amount of sensitive information retained and therefore exposed.

addresses: CWE-200 CWE-212

Regular deletion of inaccurate or outdated PII directly reduces the volume of sensitive information retained that could be exposed.

addresses: CWE-200 CWE-212

De-identification directly prevents exposure of sensitive/PII data to unauthorized actors when datasets are released or shared.

addresses: CWE-200 CWE-212

Deleting information when no longer needed directly reduces the window during which sensitive data can be exposed to unauthorized actors.

addresses: CWE-200 CWE-212

Secure disposal techniques directly prevent sensitive data from becoming accessible to unauthorized actors after components leave organizational control.

addresses: CWE-200

Automated marking applies security attributes to system outputs, making it harder for attackers to exploit unmarked sensitive information leading to unauthorized exposure.

Security SummaryAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

References