VYPR
High severity7.7NVD Advisory· Published Apr 23, 2026· Updated Apr 28, 2026

CVE-2026-40886

CVE-2026-40886

Description

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a workflow pod carries a malformed workflows.argoproj.io/pod-gc-strategy annotation. Because the panic occurs inside an informer goroutine (outside the controller's recover() scope), it crashes the entire controller process. The poisoned pod persists across restarts, causing a crash loop that halts all workflow processing until the pod is manually deleted. This vulnerability is fixed in 4.0.5 and 3.7.14.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/argoproj/argo-workflows/v4Go
>= 4.0.0, < 4.0.54.0.5
github.com/argoproj/argo-workflows/v3Go
>= 3.7.0, < 3.7.143.7.14
github.com/argoproj/argo-workflows/v3Go
>= 3.6.5, <= 3.6.19

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.