Any unprivileged user is able to deploy argocd in his namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster like all secrets which might enable privilege escalations.
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.1 Via RHSA-2021:2053 https://access.redhat.com/errata/RHSA-2021:2053
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3557