The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-13888

CVE-2025-13888: OpenShift GitOps Privilege Escalation

CVE-2025-13888 is a privilege escalation flaw in OpenShift GitOps allowing namespace admins to gain elevated permissions across namespaces and root access to clusters. This article covers technical details, impact, and mitigation.

Published: April 1, 2026

CVE-2025-13888 Overview

A critical privilege escalation vulnerability was discovered in OpenShift GitOps that allows namespace administrators to bypass namespace isolation controls. By creating malicious ArgoCD Custom Resources (CRs), authenticated attackers can manipulate the system into granting elevated permissions across namespace boundaries, including access to privileged namespaces. This exploitation path ultimately enables the creation of privileged workloads on master nodes, resulting in root-level access to the entire Kubernetes cluster.

Critical Impact

Authenticated namespace administrators can escalate privileges to gain root access to the entire OpenShift cluster through malicious ArgoCD Custom Resource manipulation.

Affected Products

  • OpenShift GitOps (versions prior to v1.16.2)
  • Red Hat GitOps Operator

Discovery Timeline

  • December 15, 2025 - CVE-2025-13888 published to NVD
  • January 22, 2026 - Last updated in NVD database

Technical Details for CVE-2025-13888

Vulnerability Analysis

This vulnerability stems from an Improper Privilege Management flaw (CWE-266) in the OpenShift GitOps operator's namespace handling logic. The core issue resides in the ArgoCD metrics controller component, which improperly applied cluster-level monitoring labels to user-controlled namespaces without adequate namespace prefix validation.

The vulnerable code path allowed namespace administrators to leverage ArgoCD Custom Resources to inject cluster monitoring labels (openshift.io/cluster-monitoring) into namespaces that should only receive user-level monitoring labels. This label manipulation enables cross-namespace privilege escalation, as the cluster monitoring label grants access to privileged namespace contexts.

Once an attacker obtains elevated namespace permissions, they can schedule privileged workloads on master nodes. Pods running with elevated privileges on control plane nodes effectively have root access to the underlying infrastructure, enabling complete cluster compromise including access to secrets, modification of cluster configurations, and lateral movement to all workloads.

Root Cause

The vulnerability exists in the argocd_metrics_controller.go file where the controller failed to differentiate between cluster namespaces (prefixed with openshift-) and user namespaces when applying monitoring labels. The original implementation uniformly applied the openshift.io/cluster-monitoring label regardless of namespace context, allowing user namespaces to inherit cluster-level monitoring privileges.

Attack Vector

The attack requires network access and authenticated access as a namespace administrator. The attacker creates an ArgoCD Custom Resource that triggers the vulnerable metrics controller code path. When the controller processes this CR, it incorrectly applies cluster monitoring labels to the attacker-controlled namespace, elevating the attacker's permissions. The changed scope allows the attacker to escape their original namespace boundary and access privileged namespaces, ultimately enabling privileged pod creation on master nodes.

go
// Security patch in controllers/argocd_metrics_controller.go
// Source: https://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef
 	}
 
 	const clusterMonitoringLabel = "openshift.io/cluster-monitoring"
-	labelVal, exists := namespace.Labels[clusterMonitoringLabel]
+	const userDefinedMonitoringLabel = "openshift.io/user-monitoring"
+	var labelVal, monitoringLabel string
+	var exists bool
+	if strings.HasPrefix(namespace.Name, "openshift-") {
+		labelVal, exists = namespace.Labels[clusterMonitoringLabel]
+		monitoringLabel = clusterMonitoringLabel
+	} else {
+		labelVal, exists = namespace.Labels[userDefinedMonitoringLabel]
+		monitoringLabel = userDefinedMonitoringLabel
+	}
 
 	if argocd.Spec.Monitoring.DisableMetrics == nil || !*argocd.Spec.Monitoring.DisableMetrics {
 		if !exists || labelVal != "true" {
 			if namespace.Labels == nil {
 				namespace.Labels = make(map[string]string)
 			}
-			namespace.Labels[clusterMonitoringLabel] = "true"
+			namespace.Labels[monitoringLabel] = "true"
 			err = r.Client.Update(ctx, &namespace)
 			if err != nil {
 				reqLogger.Error(err, "Error updating namespace",

The patch introduces namespace prefix validation, ensuring only namespaces beginning with openshift- receive the cluster monitoring label, while user namespaces receive the openshift.io/user-monitoring label instead.

Detection Methods for CVE-2025-13888

Indicators of Compromise

  • Unexpected openshift.io/cluster-monitoring=true labels on non-system namespaces (those not prefixed with openshift-)
  • ArgoCD Custom Resources created in user namespaces with unusual monitoring configurations
  • Privileged pods scheduled on master/control plane nodes originating from non-system namespaces
  • Audit log entries showing namespace label modifications by ArgoCD service accounts

Detection Strategies

  • Monitor Kubernetes audit logs for namespace label changes involving openshift.io/cluster-monitoring
  • Implement admission controller policies to alert on cluster monitoring labels applied to user namespaces
  • Review ArgoCD CR configurations for anomalous Spec.Monitoring settings
  • Track privileged workload creation events, particularly those targeting master nodes

Monitoring Recommendations

  • Enable verbose audit logging for namespace modification events and ArgoCD controller activities
  • Configure alerts for any pods with privileged security contexts deployed to control plane nodes
  • Implement namespace label monitoring using Open Policy Agent (OPA) or Kyverno policies
  • Regularly review RBAC permissions granted to namespace administrators

How to Mitigate CVE-2025-13888

Immediate Actions Required

  • Upgrade OpenShift GitOps Operator to version v1.16.2 or later immediately
  • Audit all namespaces for unauthorized openshift.io/cluster-monitoring labels and remove them from non-system namespaces
  • Review and restrict namespace administrator permissions where possible
  • Inspect master/control plane nodes for any unauthorized privileged workloads

Patch Information

Red Hat has released security patches addressing this vulnerability. Refer to the following advisories for patched versions:

  • Red Hat Security Advisory RHSA-2025:23203
  • Red Hat Security Advisory RHSA-2025:23206
  • Red Hat Security Advisory RHSA-2025:23207
  • Red Hat Security Advisory RHSA-2026:1017

The fix is available in GitOps Operator v1.16.2. For technical details, see GitHub Pull Request #897.

Workarounds

  • Implement admission controllers to block the openshift.io/cluster-monitoring label on non-system namespaces
  • Restrict ArgoCD Custom Resource creation to trusted administrators only using RBAC
  • Apply Pod Security Policies or Pod Security Standards to prevent privileged workloads on control plane nodes
  • Consider temporarily disabling ArgoCD metrics collection until patching is complete by setting Spec.Monitoring.DisableMetrics: true
bash
# Audit namespaces for unauthorized cluster monitoring labels
kubectl get namespaces -o json | jq -r '.items[] | select(.metadata.labels["openshift.io/cluster-monitoring"] == "true") | select(.metadata.name | startswith("openshift-") | not) | .metadata.name'

# Remove unauthorized labels from affected namespaces
kubectl label namespace <namespace-name> openshift.io/cluster-monitoring-

# Verify GitOps Operator version
kubectl get deployment gitops-operator-controller-manager -n openshift-gitops-operator -o jsonpath='{.spec.template.spec.containers[0].image}'

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechOpenshift

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-266
  • Technical References
  • Red Hat Security Advisory RHSA-2025:23203

  • Red Hat Security Advisory RHSA-2025:23206

  • Red Hat Security Advisory RHSA-2025:23207

  • Red Hat Security Advisory RHSA-2026:1017

  • Red Hat CVE Report CVE-2025-13888

  • Red Hat Bug Report #2418361

  • GitHub Commit - GitOps Operator

  • GitHub Pull Request #897 - GitOps Operator

  • GitHub Release v1.16.2 - GitOps Operator
  • Related CVEs
  • CVE-2024-25133: OpenShift Hive Privilege Escalation Flaw

  • CVE-2024-6508: OpenShift Console CSRF Vulnerability

  • CVE-2024-1139: OCP Cluster Monitoring Information Leak Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English