Description
Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
Published: 2026-04-10
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ff24-4prj-gpmj Arcane has Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint
History

Fri, 10 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
Title Arcane Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-10T20:34:12.777Z

Reserved: 2026-04-10T17:31:45.785Z

Link: CVE-2026-40242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-10T21:16:27.747

Modified: 2026-04-10T21:16:27.747

Link: CVE-2026-40242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses