Impact
Arcane's Huma backend exposes four GET endpoints under /api/templates* that lack authentication. An unauthenticated client can retrieve the full Compose YAML and .env files for every custom template stored in the system. Because the UI flow Save as Template persists operator-provided environment variables verbatim, the disclosed data includes database passwords, API keys, and other confidential information. This flaw is a classic missing authorization error (CWE‑862) that directly leads to uncontrolled information disclosure of sensitive operator secrets.
Affected Systems
The vulnerability affects all installations of Arcane prior to version 1.18.0, produced by getarcaneapp. Versions 1.18.0 and later contain a patch that restricts access to the /api/templates endpoints and requires proper authentication for all CRUD operations.
Risk and Exploitability
The CVSS score of 8.7 classifies this flaw as high severity. EPSS data is not available, and the vulnerability is not listed in CISA KEV. An attacker does not need credentials; sending unauthenticated HTTP GET requests to the vulnerable endpoints over the network is sufficient to obtain sensitive configuration data. The attack can be performed from any host that can reach the Arcane API, and no additional prerequisites are required.
OpenCVE Enrichment
Github GHSA