Home

Description

Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecycle.post-update that allowed defining a command to run before or after a container update. The label value is passed directly to /bin/sh -c without sanitization or validation. Because any authenticated user (not limited to administrators) can create projects through the API, an attacker can create a project that specifies one of these lifecycle labels with a malicious command. When an administrator later triggers a container update (either manually or via scheduled update checks), Arcane reads the lifecycle label and executes its value as a shell command inside the container. This vulnerability is fixed in 1.13.0.

PUBLISHED Reserved 2026-01-13 | Published 2026-01-15 | Updated 2026-01-15 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 1.13.0
affected

References

github.com/...arcane/security/advisories/GHSA-gjqq-6r35-w3r8

github.com/getarcaneapp/arcane/pull/1468

github.com/...ommit/5a9c2f92e11f86f8997da8c672844468f930b7e4

github.com/getarcaneapp/arcane/releases/tag/v1.13.0

cve.org (CVE-2026-23520)

nvd.nist.gov (CVE-2026-23520)

Download JSON