CVE-2026-23520

CRITICAL

Arcane <1.13.0 - Command Injection

Title source: llm

Description

Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecycle.post-update that allowed defining a command to run before or after a container update. The label value is passed directly to /bin/sh -c without sanitization or validation. Because any authenticated user (not limited to administrators) can create projects through the API, an attacker can create a project that specifies one of these lifecycle labels with a malicious command. When an administrator later triggers a container update (either manually or via scheduled update checks), Arcane reads the lifecycle label and executes its value as a shell command inside the container. This vulnerability is fixed in 1.13.0.

Exploits (4)

nomisec WRITEUP 9 stars
by secopssite · poc
https://github.com/secopssite/HTB
nomisec WORKING POC 1 stars
by Augmaster · poc
https://github.com/Augmaster/POC-CVE-2026-23520
nomisec WORKING POC 1 stars
by 0xzap · poc
https://github.com/0xzap/CVE-2026-23520
nomisec WORKING POC
by cypher-21 · poc
https://github.com/cypher-21/CVE-2026-23520

Scores

CVSS v3 9.0
EPSS 0.0003
EPSS Percentile 9.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (2)
arcane/arcane < 1.13.0
getarcaneapp/arcane 0 - 0.0.0-20260114065515-5a9c2f92e11fGo
Published Jan 15, 2026
Tracked Since Feb 18, 2026