CVE-2026-40242

Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getarcane:arcane:*:*:*:*:*:*:*:*

History

21 Apr 2026, 19:01

Type Values Removed Values Added
CPE cpe:2.3:a:getarcane:arcane:*:*:*:*:*:*:*:*
References () https://github.com/getarcaneapp/arcane/releases/tag/v1.17.3 - () https://github.com/getarcaneapp/arcane/releases/tag/v1.17.3 - Release Notes
References () https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj - () https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj - Exploit, Vendor Advisory
First Time Getarcane
Getarcane arcane

13 Apr 2026, 21:16

Type Values Removed Values Added
References () https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj - () https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj -

10 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 21:16

Updated : 2026-04-21 19:01


NVD link : CVE-2026-40242

Mitre link : CVE-2026-40242

CVE.ORG link : CVE-2026-40242


JSON object : View

Products Affected

getarcane

  • arcane
CWE
CWE-918

Server-Side Request Forgery (SSRF)