Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-42461 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

- **Nature**: Arcane ≀1.17.x backend `/api/templates*` GET endpoint 🚨**No authorization check** - **Impact**: Unauthenticated users can read **all custom Compose YAMLs + .env files** πŸ’£ - **Risk**: Direct leakage of sensi…

Q2Root Cause? (CWE/Flaw)

- **Vulnerability Point**: Backend GET method lacks access control πŸ›‘ - **Contradictory Design**: Frontend `PROTECTED_PREFIXES` already marks paths as protected 🀯 - **Similar to CWE-862**: Missing authorization check πŸ” - …

Q3Who is affected? (Versions/Components)

- **Affected Versions**: Arcane **< 1.18.0** ⏳ - **Affected Component**: Huma backend `/api/templates*` GET endpoint πŸ“Œ - **Related Feature**: `Save as Template` β†’ Persists .env content πŸ’Ύ

Q4What can hackers do? (Privileges/Data)

- **No login required** πŸšͺ - **Can list directories & read files** πŸ“‚ - **Obtain full Compose configuration** 🧾 - **Extract keys/passwords from .env** πŸ”‘ - **Risk of lateral movement/service takeover** πŸ•΅οΈβ€β™‚οΈ

Q5Is exploitation threshold high? (Auth/Config)

- **Extremely low barrier** 🟒 - **No authentication required** ❌ - **Triggerable by any network client** 🌐 - **Only requires sending a GET request** πŸ“‘

Q6Is there a public Exp? (PoC/Wild Exploitation)

- **No PoC available** πŸ“­ - **No reports of in-the-wild exploitation** πŸ“‰ - **However, the principle is simple and requests are easy to construct** βš™οΈ - **Risk: Quick exploiters will grab the opportunity first** 🎯

Q7How to self-check? (Features/Scanning)

- **Signature**: Calling `/api/templates*` GET endpoint returns YAML/.env content πŸ” - **Self-check method**: - Make anonymous requests using curl πŸ–₯️ - Check if the response contains `environment:` or `KEY=VALUE` cont…

Q8Is it fixed officially? (Patch/Mitigation)

- **Fixed** βœ… - **Fixed Version**: **1.18.0** πŸ›‘οΈ - **Release Link**: [Release v1.18.0](https://github.com/getarcaneapp/arcane/releases/tag/v1.18.0) - **Security Advisory**: [GHSA-cxx3-hr75-4q96](https://github.com/getarc…

Q9What if no patch? (Workaround)

- **Upgrade immediately** to β‰₯1.18.0 πŸš€ (Recommended) - **Temporary mitigation**: - Restrict network access to `/api/templates*` 🚧 - Add an authentication layer via reverse proxy πŸ” - Delete existing templates contai…

Q10Is it urgent? (Priority Suggestion)

- **Critical severity** 🚨 - **Priority: MAX** πŸ”₯ - **Reason**: Zero-barrier access to keys πŸ’£ - **Recommendation**: Immediately check version β†’ apply patch β†’ clear sensitive templates ⏱️