Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
References
| Link | Resource |
|---|---|
| https://github.com/getarcaneapp/arcane/releases/tag/v1.17.3 | Release Notes |
| https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj | Exploit Vendor Advisory |
| https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj | Exploit Vendor Advisory |
Configurations
History
21 Apr 2026, 19:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:getarcane:arcane:*:*:*:*:*:*:*:* | |
| References | () https://github.com/getarcaneapp/arcane/releases/tag/v1.17.3 - Release Notes | |
| References | () https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj - Exploit, Vendor Advisory | |
| First Time |
Getarcane
Getarcane arcane |
13 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj - |
10 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 21:16
Updated : 2026-04-21 19:01
NVD link : CVE-2026-40242
Mitre link : CVE-2026-40242
CVE.ORG link : CVE-2026-40242
JSON object : View
Products Affected
getarcane
- arcane
CWE
CWE-918
Server-Side Request Forgery (SSRF)
