{"id":45162,"date":"2022-02-04T21:34:00","date_gmt":"2022-02-04T21:34:00","guid":{"rendered":"http:\/\/3a258378-c738-4d7d-8fa1-923124e666ca"},"modified":"2022-02-04T21:34:00","modified_gmt":"2022-02-04T21:34:00","slug":"argo-cd-releases-patch-for-zero-day-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/","title":{"rendered":"Argo CD releases patch for zero-day vulnerability"},"content":{"rendered":"<p>Argo CD <a href=\"https:\/\/github.com\/argoproj\/argo-cd\/security\/advisories\/GHSA-63qx-x74g-jcr7\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">released<\/a> a patch this week for a zero-day vulnerability enabling attackers to access sensitive information like passwords and API keys.<\/p>\n<p>The vulnerability was discovered by Apiiro&#8217;s Security Research team and <a href=\"https:\/\/apiiro.com\/blog\/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">explained<\/a> in a blog post released alongside the patch.&nbsp;<\/p>\n<p>Argo CD is a popular open source Continuous Delivery platform, and the vulnerability &#8212; tagged as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-24348\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2022-24348<\/a>&nbsp;with a CVSS score of 7.7 &#8212; &#8220;allows malicious actors to load a Kubernetes Helm Chart YAML file to the vulnerability and &#8216;hop&#8217; from their application ecosystem to other applications&#8217; data outside of the user&#8217;s scope.&#8221;&nbsp;<\/p>\n<div class=\"relatedContent alignRight\" readability=\"7.6363636363636\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" class alt=\"The best security key\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> The best security key <\/a> <\/p>\n<p class=\"dek\">While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>The actors can then read and exfiltrate data residing in other applications, according to Apiiro.&nbsp;<\/p>\n<p>On GitHub, the company said all versions of Argo CD are vulnerable to the path traversal bug and noted that it is &#8220;possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the repository&#8217;s root directory.&#8221;<\/p>\n<p>&#8220;If an attacker with permissions to create or update Applications knows or can guess the full path to a file containing valid YAML, they can create a malicious Helm chart to consume that YAML as values files, thereby gaining access to data they would otherwise have no access to,&#8221; Argo CD explained.<\/p>\n<p>&#8220;The impact can especially become critical in environments that make use of encrypted value files (e.g. using plugins with git-crypt or SOPS) containing sensitive or confidential data, and decrypt these secrets to disk before rendering the Helm chart. Also, because any error message from helm template is passed back to the user, and these error messages are quite verbose, enumeration of files on the repository server&#8217;s file system is possible.&#8221;<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/argo-cd-releases-patch-for-0-day-vulnerability\/\" class=\"lazy\" alt=\"cve-image-2048x1392.png\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/www.zdnet.com\/a\/img\/resize\/40d3fbd98bd7b64ac846d3d250d764df160906d9\/2022\/02\/04\/331edb43-37f8-457a-bd09-d8f38ad28dcd\/cve-image-2048x1392.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/40d3fbd98bd7b64ac846d3d250d764df160906d9\/2022\/02\/04\/331edb43-37f8-457a-bd09-d8f38ad28dcd\/cve-image-2048x1392.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\" class alt=\"cve-image-2048x1392.png\" height=\"auto\" width=\"1200\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Apiiro <\/span><\/figcaption><\/figure>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>There are no workarounds for the issue, and Argo CD urged its users to update their installations. Patches have been released for Argo CD v2.3.0, v2.2.4, and v2.1.9.<\/p>\n<p>Apiiro explained that it notified Argo CD of the issue on January 30, and the two sides worked on resolving it over the last week.&nbsp;<\/p>\n<p>Vulcan Cyber CEO Yaniv Bar-Dayan said they are generally seeing more advanced persistent threats that leverage zero-day and known, unmitigated vulnerabilities in software supply chain software, such as Argo CD.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\" readability=\"7.0796460176991\">\n<h3 class=\"heading\"> <span class=\"int\">see also<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fe9773f3aaac5f7c36118521f7900ecbdc9c6134\/2020\/11\/19\/67f3512d-b94e-479f-b05d-23ed89561c7f\/istock-1168629063.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" class alt=\"Best VPN services\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> Best VPN services <\/a> <\/p>\n<p class=\"dek\">Virtual private networks are essential to staying safe online &#8212; especially for remote workers and businesses. Here are your top choices in VPN service providers and how to get set up fast.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>For years, known, unmitigated vulnerabilities have contributed more than any other factor to mounting cyber risk, Bar-Dayan added.<\/p>\n<p>&#8220;But hackers are always looking for the most-effective path of least resistance to attain their objectives. A recent rash of advanced persistent threats that leverage a supply chain zero-day vulnerability daisy chained with known, unmitigated vulnerabilities, demonstrates how hackers are becoming increasingly sophisticated and opportunistic. Obviously the <a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-attack-hit-100-companies-and-took-months-of-planning-says-white-house\/\" target=\"_blank\" rel=\"noopener\">SolarWinds hack<\/a> was the most notorious APT to use the software supply chain as the main attack vector,&#8221; Bar-Dayan explained.&nbsp;<\/p>\n<p>&#8220;In the event of a breach, it is unfair to put all the blame on the software supply chain vendor considering how bad actors often use known, unaddressed vulnerabilities that should have been mitigated by IT security teams well before the software supply chain hack became a reality.&nbsp;<\/p>\n<p>&#8220;We need to do better as an industry before our cyber debt sinks us. Apiiro and Argo have taken the right steps to help Argo customers reduce the risk associated with CVE-2022-24348, but now IT security teams must collaborate and do the work to protect their development environments and software supply chains from threat actors.&#8221;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/argo-cd-releases-patch-for-0-day-vulnerability\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious actors can load a Kubernetes Helm Chart YAML file to the vulnerability and &#8220;hop from their application ecosystem to other applications&#8217; data outside of the user&#8217;s scope,&#8221; says Apiiro.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45162","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Argo CD releases patch for zero-day vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Argo CD releases patch for zero-day vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-04T21:34:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Argo CD releases patch for zero-day vulnerability\",\"datePublished\":\"2022-02-04T21:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/\",\"name\":\"Argo CD releases patch for zero-day vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"datePublished\":\"2022-02-04T21:34:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/argo-cd-releases-patch-for-zero-day-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Argo CD releases patch for zero-day vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Argo CD releases patch for zero-day vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Argo CD releases patch for zero-day vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-04T21:34:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Argo CD releases patch for zero-day vulnerability","datePublished":"2022-02-04T21:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/","name":"Argo CD releases patch for zero-day vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","datePublished":"2022-02-04T21:34:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/argo-cd-releases-patch-for-zero-day-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Argo CD releases patch for zero-day vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45162"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45162\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}