RCE via ZipSlip and symbolic links in argoproj/argo-workflows
High severity
GitHub Reviewed
Published
Dec 9, 2025
in
argoproj/argo-workflows
•
Updated Dec 9, 2025
Description
Published to the GitHub Advisory Database
Dec 9, 2025
Reviewed
Dec 9, 2025
Published by the National Vulnerability Database
Dec 9, 2025
Last updated
Dec 9, 2025
Summary
The patch deployed against CVE-2025-62156 is ineffective against malicious archives containing symbolic links.
Details
The untar code that handles symbolic links in archives is unsafe. Concretely, the computation of the link's target and the subsequent check are flawed:
https://github.com/argoproj/argo-workflows/blob/5291e0b01f94ba864f96f795bb500f2cfc5ad799/workflow/executor/executor.go#L1034-L1037
PoC
Impact
The attacker can overwrite the file /var/run/argo/argoexec with a script of their choice, which will be executed at the pod's start.
References