CVE-2026-40242: Unauthenticated Server-Side Request Forgery in Arcane Template Fetch Mechanism
Vulnerability ID: CVE-2026-40242
CVSS Score: 7.2
Published: 2026-04-10
Arcane, a web-based interface for managing Docker environments, contains a high-severity unauthenticated Server-Side Request Forgery (SSRF) vulnerability. Prior to version 1.17.3, the application exposed the /api/templates/fetch endpoint without authentication, allowing remote attackers to force the server to perform outbound HTTP GET requests to arbitrary destinations. The vulnerability exposes internal network services, cloud provider metadata endpoints, and internal application states through robust error-based side-channels and direct response reflection.
TL;DR
Arcane versions prior to 1.17.3 are vulnerable to unauthenticated SSRF via the /api/templates/fetch endpoint. Attackers can leverage this to scan internal networks, access cloud metadata, and extract internal service data due to poor input validation and verbose error reflection.
Technical Details
- CWE ID: CWE-918
- Attack Vector: Network
- CVSS Score: 7.2 (High)
- Impact: Server-Side Request Forgery / Info Disclosure
- Exploit Status: Unweaponized / Proof-of-Concept
- CISA KEV: Not Listed
Affected Systems
- Arcane < 1.17.3
-
Arcane: < 1.17.3 (Fixed in:
1.17.3)
Code Analysis
Commit: 8e67b3b
Implemented SafeOutboundHTTPClient and required authentication on template fetch endpoint.
Mitigation Strategies
- Upgrade to Arcane version 1.17.3 or later to receive the patched
SafeOutboundHTTPClientimplementation. - Restrict network access to the Arcane application interface using external firewalls or identity-aware proxies.
- Implement network egress filtering on the host running Arcane to block access to cloud metadata services (
169.254.169.254) unless explicitly required. - Utilize Web Application Firewall (WAF) rules to detect and block anomalous
urlparameters containing internal IP addresses or localhost references.
Remediation Steps:
- Determine the current version of the Arcane application running in the environment.
- Pull the latest Arcane Docker image or binary corresponding to version 1.17.3.
- Deploy the updated version and verify that the
/api/templates/fetchendpoint returns a 401 Unauthorized status for unauthenticated requests. - Review application logs for historical unauthorized access to the
/api/templates/fetchendpoint to identify potential prior exploitation.
References
Read the full report for CVE-2026-40242 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)