CVE-2026-43824
Argo CD ServerSideDiff Secret Data Exposure
Publication date: 2026-05-02
Last updated on: 2026-05-04
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| argoproj | argo_cd | to 3.2.11 (inc) |
| argoproj | argo_cd | to 3.3.9 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-212 | The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Argo CD to a patched version: 3.2.11 or later in the 3.2.x series, or 3.3.9 or later in the 3.3.x series.
Additionally, review and restrict RBAC permissions to limit access to the ServerSideDiff endpoint, as exploitation requires only authenticated user permissions.
Consider removing or avoiding the use of the annotation 'argocd.argoproj.io/compare-options: IncludeMutationWebhook=true' on Applications, as it disables the defense layer that strips sensitive data from the ServerSideDiff response.
Can you explain this vulnerability to me?
CVE-2026-43824 is a critical vulnerability in Argo CD versions 3.2.0 to 3.3.8 that allows attackers with read-only access to extract plaintext Kubernetes Secret data from etcd via the ServerSideDiff endpoint.
The issue arises because the ServerSideDiff function returns unmasked Secret data in its response, unlike other endpoints that mask Secret data. This happens due to a missing authorization and data-masking gap.
The vulnerability is worsened when the Application has the annotation 'argocd.argoproj.io/compare-options: IncludeMutationWebhook=true', which disables the defense layer that normally strips non-Argo CD-managed fields from the Server-Side Apply dry-run response, exposing real Secret values directly.
Exploitation requires only RBAC permissions to call the ServerSideDiff function, which every authenticated Argo CD user has by default.
How can this vulnerability impact me? :
This vulnerability can lead to the exposure of sensitive data such as service account tokens, TLS certificates, database credentials, and API keys.
Since attackers with only read-only access can extract this data without user interaction, it poses a high confidentiality risk.
The CVSS score of 9.6 (Critical) reflects the high impact on confidentiality and integrity, combined with low attack complexity.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if your Argo CD installation is running a vulnerable version between 3.2.0 and 3.3.8. Additionally, detection involves verifying if the ServerSideDiff endpoint is accessible and if the Application has the annotation 'argocd.argoproj.io/compare-options: IncludeMutationWebhook=true', which increases exposure risk.
Since exploitation requires only RBAC permissions to call the ServerSideDiff function, you can attempt to query this endpoint using authenticated Argo CD user credentials to see if unmasked Secret data is returned.
Suggested commands include using curl or kubectl to interact with the Argo CD API ServerSideDiff endpoint, for example:
- curl -k -H "Authorization: Bearer <token>" https://<argocd-server>/api/v1/applications/<app-name>/diff
- kubectl -n argocd exec -it <argocd-server-pod> -- curl -k -H "Authorization: Bearer <token>" https://localhost:8080/api/v1/applications/<app-name>/diff
If the response contains cleartext Kubernetes Secret data, the vulnerability is present.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows attackers with read-only access to extract plaintext Kubernetes Secret data, including sensitive information such as service account tokens, TLS certificates, database credentials, and API keys. Exposure of such sensitive data can lead to unauthorized access and data breaches.
Such exposure of confidential information can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict protection of sensitive data to prevent unauthorized disclosure.
Therefore, organizations using affected versions of Argo CD may face increased risk of non-compliance due to potential leakage of protected data through this vulnerability.