Critical CVE-2025-32445 Vulnerability in Argo Events Scores CVSS 10

A critical vulnerability identified as CVE-2025-32445 has been discovered in Argo Events, an event-driven workflow automation framework for Kubernetes, with a CVSS score of 10. This flaw arises from how Argo Events manages EventSource and Sensor custom resources, enabling users with permission to create or modify these resources to gain privileged access to the host system and cluster, bypassing direct administrative privileges. The vulnerability is linked to the customization of container properties such as command, args, securityContext, and volumeMount within the spec.template and spec.template.container sections, allowing attackers to gain privileged access to the cluster host by manipulating settings like privileged: true and mounting the host’s root filesystem. This poses significant risks, particularly in multi-tenant Kubernetes clusters, leading to potential tenant isolation breaches, unauthorized host or cluster access, and compromise of the host system. The Argo team has addressed this issue with a patch in version v1.9.6, which restricts the properties allowed under spec.template.container, urging users to upgrade promptly to mitigate the threat.
- T1199: Trusted Relationship: The article describes a vulnerability in Argo Events that allows users with permission to create or modify EventSource and Sensor custom resources to gain privileged access to the host system and cluster. This involves exploiting the handling of EventSource and Sensor CRs by customizing container properties, which is a form of exploitation of a trusted relationship. The attacker can gain elevated privileges by setting the spec.template.container with properties like privileged: true and adding the SYS_ADMIN capability, thus escalating their privileges. This aligns with the MITRE ATT&CK technique for exploiting trusted relationships, where an attacker abuses a legitimate relationship to gain elevated access.
- T1068: Exploitation for Privilege Escalation: The article details how the vulnerability in Argo Events can be exploited by modifying the spec.template.container section of EventSource and Sensor CRs to gain privileged access to the cluster host. This includes settings such as privileged: true and adding the SYS_ADMIN capability, which allow the attacker to escalate their privileges within the Kubernetes environment. This matches the MITRE ATT&CK technique for container and system privilege escalation, where an attacker exploits a weakness to gain higher privileges.
- T1005: Data from Local System: The vulnerability allows an attacker to mount the host's root filesystem by exploiting the customization capabilities of the spec.template.container. This action provides the attacker with access to the host system's filesystem, effectively allowing them to break tenant isolation and access other tenants' data. This corresponds to the MITRE ATT&CK technique for data from local system, where an attacker gains access to and exfiltrates data from the local filesystem.
- T1562: Impair Defenses: By exploiting the vulnerability, the attacker can bypass security models, including RBAC restrictions and Pod Security Policies/Standards. This indicates a circumvention of access controls, which is a core concept in the MITRE ATT&CK framework for access control bypass. This involves exploiting vulnerabilities or misconfigurations to gain access to resources that should be restricted.