Description
Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
Published: 2026-04-10
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery (SSRF)
Action: Apply patch
AI Analysis

Impact

Arcane permits unauthenticated remote users to supply a URL to the /api/templates/fetch endpoint. The application performs an HTTP GET to that URL without verifying the scheme or host and then returns the raw response to the requester. This lack of validation constitutes a server‑side request forgery flaw that gives an attacker the ability to query any resource reachable from the Arcane host, potentially leaking internal data or enabling further lateral movement.

Affected Systems

Any publicly exposed installation of Arcane from the getarcaneapp vendor running a version prior to 1.17.3 is susceptible. The vulnerability affects the /api/templates/fetch endpoint in the Arcane container‑management interface, which manages Docker resources. The fix is included in release 1.17.3 and later.

Risk and Exploitability

The CVSS base score of 7.2 indicates moderate‑to‑high severity; the reported exploitation likelihood is low, as indicated by the EPSS score of 1.525%, and the vulnerability is not catalogued in known exploit databases. Because the flaw is reachable over the public network without authentication or authorization, an attacker can simply craft a request to the endpoint to direct the server to any internal or external address. Absence of host or scheme checks makes exploitation trivial for a determined adversary, and the ability to retrieve raw responses provides a rich source of reconnaissance. The overall risk is therefore amplified by the lack of access controls and the sensitive nature of the data that may be accessible internally.

Generated by OpenCVE AI on April 22, 2026 at 19:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Arcane to version 1.17.3 or newer, which removes the unvalidated URL handling from /api/templates/fetch.
  • If an upgrade is not immediately possible, restrict access to the /api/templates/fetch endpoint by placing a firewall or reverse‑proxy rule that denies external requests or requires authentication.
  • Implement network segmentation so that the Arcane host cannot access sensitive internal services, limiting the impact of a successful SSRF.
  • Monitor request logs for abnormal use of /api/templates/fetch and investigate any unexpected outbound HTTP requests.

Generated by OpenCVE AI on April 22, 2026 at 19:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ff24-4prj-gpmj Arcane has Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint
History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Getarcane
Getarcane arcane
CPEs cpe:2.3:a:getarcane:arcane:*:*:*:*:*:*:*:*
Vendors & Products Getarcane
Getarcane arcane

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Getarcaneapp
Getarcaneapp arcane
Vendors & Products Getarcaneapp
Getarcaneapp arcane

Fri, 10 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
Title Arcane Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Getarcane Arcane
Getarcaneapp Arcane
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T20:54:36.822Z

Reserved: 2026-04-10T17:31:45.785Z

Link: CVE-2026-40242

cve-icon Vulnrichment

Updated: 2026-04-13T20:54:27.568Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T21:16:27.747

Modified: 2026-04-21T19:01:58.550

Link: CVE-2026-40242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:00:08Z

Weaknesses