The vulnerability stems from improper sanitization of repository URLs in Argo CD's UI. Specifically, the frontend logic fails to filter out javascript: protocol injections, allowing a user with permission to edit a repository to inject malicious URLs. When viewed by another authenticated user, this could result in execution of arbitrary JavaScript in the victim's browser, potentially allowing unauthorized actions through the victim's session.The issue is addressed in Argo CD versions 3.0.2, 2.14.12, and 2.13.8.