CVE-2026-42461
Received Received - Intake
Unauthenticated Template Secrets Exposure in Arcane

Publication date: 2026-05-09

Last updated on: 2026-05-09

Assigner: GitHub, Inc.

Description
Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to version 1.18.0, four GET endpoints under /api/templates* in Arcane's Huma backend are registered without any Security requirement, allowing any unauthenticated network client to list and read the full Compose YAML and .env content of every custom template stored in the instance. Because Arcane's UI exposes a "Save as Template" flow on the project / swarm-stack creation pages that persists the operator's real env content (database passwords, API keys, etc.) verbatim, this missing authorization is an unauthenticated read of operator secrets in practice β€” not a theoretical info-disclosure. The frontend explicitly treats /customize/templates/* as an authenticated area (PROTECTED_PREFIXES in frontend/src/lib/utils/redirect.util.ts), and every CRUD operation (POST/PUT/DELETE) on the same paths requires a Bearer/API key, so this is a clear backend authorization gap, not intended public access. This issue has been patched in version 1.18.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-09
Last Modified
2026-05-09
Generated
2026-05-09
AI Q&A
2026-05-09
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
getarcaneapp arcane 1.18.0
getarcaneapp arcane to 1.18.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Arcane versions prior to 1.18.0 involves four GET endpoints under /api/templates* in the backend that lack any security requirements. This means any unauthenticated network client can access and read the full Compose YAML and .env content of every custom template stored in the instance.

Because Arcane's UI allows operators to save real environment variables such as database passwords and API keys verbatim as templates, this missing authorization results in an unauthenticated read of sensitive operator secrets. The frontend treats these endpoints as protected and requires authentication for other operations, so this is an unintended backend authorization gap.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated access to sensitive operator secrets such as database passwords and API keys stored in custom templates. Exposure of such sensitive information can lead to unauthorized data access and potential data breaches.

Because the vulnerability results in unauthorized disclosure of confidential credentials and environment variables, it can negatively impact compliance with data protection standards and regulations like GDPR and HIPAA, which require strict controls over access to sensitive data and protection of personal and confidential information.

The flaw represents a backend authorization gap that bypasses intended authentication controls, increasing the risk of data exposure and non-compliance with security requirements mandated by these regulations.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information such as database passwords, API keys, and other environment secrets stored in custom templates. An attacker can access these secrets without authentication, potentially compromising the security of your systems.

Additionally, the exposed data includes internal asset enumeration, revealing details about services and compose files used by your team, which could aid further attacks or reconnaissance.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access the vulnerable GET endpoints under /api/templates* on the Arcane backend without authentication. Specifically, sending unauthenticated GET requests to endpoints such as /templates, /templates/all, /templates/{id}, and /templates/{id}/content can reveal whether sensitive Compose YAML and .env content is exposed.

You can use commands like curl to test these endpoints for unauthorized access. For example:

  • curl -v http://<arcane-instance>/api/templates
  • curl -v http://<arcane-instance>/api/templates/all
  • curl -v http://<arcane-instance>/api/templates/{id}
  • curl -v http://<arcane-instance>/api/templates/{id}/content

If these requests return Compose YAML or .env content without requiring authentication, the system is vulnerable.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Arcane application to version 1.18.0 or later, where this vulnerability has been patched by adding proper authorization checks to the affected endpoints.

Until the upgrade can be performed, restrict network access to the Arcane backend API endpoints, especially the /api/templates* paths, to trusted and authenticated users only.

Additionally, review and rotate any potentially exposed secrets such as database passwords and API keys that may have been leaked due to this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart