{
  "threat_severity" : "Important",
  "public_date" : "2025-12-15T13:00:00Z",
  "bugzilla" : {
    "description" : "openshift-gitops-operator: OpenShift GitOps: Namespace Admin Cluster Takeover via Privileged Jobs",
    "id" : "2418361",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2418361"
  },
  "cvss3" : {
    "cvss3_base_score" : "9.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-266",
  "details" : [ "A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.", "A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster." ],
  "statement" : "Red Hat rates this vulnerability as Important instead of Critical. While full cluster compromise is possible, it requires the attacker to already possess authenticated namespace administrator credentials, reducing the attack surface to authorized internal users rather than external attackers.",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift GitOps 1.16",
    "release_date" : "2025-12-15T00:00:00Z",
    "advisory" : "RHSA-2025:23207",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1.16::el8",
    "package" : "openshift-gitops-1/gitops-rhel8-operator:sha256:52b550b043480277626e591ec85b832e91f69b5f91dd72fc8823788635f0eb11"
  }, {
    "product_name" : "Red Hat OpenShift GitOps 1.17",
    "release_date" : "2025-12-15T00:00:00Z",
    "advisory" : "RHSA-2025:23206",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1.17::el8",
    "package" : "openshift-gitops-1/gitops-rhel8-operator:sha256:27e7a59bb5c5f60be7509e5f4f07f4181d62e6583a943c46f56f568bfc30c2c1"
  }, {
    "product_name" : "Red Hat OpenShift GitOps 1.18",
    "release_date" : "2025-12-15T00:00:00Z",
    "advisory" : "RHSA-2025:23203",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1.18::el8",
    "package" : "openshift-gitops-1/gitops-rhel8-operator:sha256:1e382dc8429f5224c1e353f08d99af1be092d960b0d9f98db495aeee314ff510"
  }, {
    "product_name" : "Red Hat OpenShift GitOps 1.18",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:1017",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1.18::el8",
    "package" : "openshift-gitops-1/gitops-rhel8-operator:sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift GitOps",
    "fix_state" : "Not affected",
    "package_name" : "openshift-gitops-1/gitops-operator-bundle",
    "cpe" : "cpe:/a:redhat:openshift_gitops:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-13888\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-13888\nhttps://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef\nhttps://github.com/redhat-developer/gitops-operator/pull/897\nhttps://github.com/redhat-developer/gitops-operator/releases/tag/v1.16.2" ],
  "name" : "CVE-2025-13888",
  "csaw" : false
}