Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Ensure that `AppProject` resources are configured to enforce strict tenant isolation within Red Hat OpenShift GitOps environments. Additionally, restrict the permissions of the Argo CD Image Updater controller to operate only within its designated namespaces, and limit the ability of users to create or modify `ImageUpdater` resources to trusted administrators. This reduces the risk of unauthorized cross-namespace application updates.
Thu, 16 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 15 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace boundaries. By exploiting insufficient validation, the attacker can trigger unauthorized image updates on applications managed by other tenants. This leads to cross-namespace privilege escalation, impacting application integrity through unauthorized application updates. | |
| Title | Argocd-image-updater: argocd image updater: cross-namespace privilege escalation via insufficient namespace validation | |
| First Time appeared |
Redhat
Redhat openshift Gitops |
|
| Weaknesses | CWE-1220 | |
| CPEs | cpe:/a:redhat:openshift_gitops:1 | |
| Vendors & Products |
Redhat
Redhat openshift Gitops |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-15T21:34:07.022Z
Reserved: 2026-04-15T19:29:52.786Z
Link: CVE-2026-6388
No data.
Status : Received
Published: 2026-04-15T22:17:22.583
Modified: 2026-04-15T22:17:22.583
Link: CVE-2026-6388
OpenCVE Enrichment
Updated: 2026-04-16T02:30:21Z