CVE-2026-40242
HIGH NUCLEIArcane Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint
Title source: cnaDescription
Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3.
Nuclei Templates (1)
Arcane <= 1.17.2 - Server-Side Request Forgery
HIGHVERIFIEDby 0x_Akoko
Shodan:
http.html:"arcane"
Scores
CVSS v3
7.2
EPSS
0.0152
EPSS Percentile
81.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Details
CWE
CWE-918
Status
published
Products (3)
getarcane/arcane
< 1.17.3
getarcaneapp/arcane
0 - 1.17.3Go
getarcaneapp/arcane
< 1.17.3
Published
Apr 10, 2026
Tracked Since
Apr 11, 2026