Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gjqq-6r35-w3r8 | Arcane Has a Command Injection in Arcane Updater Lifecycle Labels That Enables RCE |
Thu, 05 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arcane
Arcane arcane |
|
| CPEs | cpe:2.3:a:arcane:arcane:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arcane
Arcane arcane |
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getarcaneapp
Getarcaneapp arcane |
|
| Vendors & Products |
Getarcaneapp
Getarcaneapp arcane |
Thu, 15 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecycle.post-update that allowed defining a command to run before or after a container update. The label value is passed directly to /bin/sh -c without sanitization or validation. Because any authenticated user (not limited to administrators) can create projects through the API, an attacker can create a project that specifies one of these lifecycle labels with a malicious command. When an administrator later triggers a container update (either manually or via scheduled update checks), Arcane reads the lifecycle label and executes its value as a shell command inside the container. This vulnerability is fixed in 1.13.0. | |
| Title | Arcane has a Command Injection in Arcane Updater Lifecycle Labels Enables RCE | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-15T19:58:45.182Z
Reserved: 2026-01-13T18:22:43.980Z
Link: CVE-2026-23520
Updated: 2026-01-15T19:58:41.451Z
Status : Analyzed
Published: 2026-01-15T20:16:05.467
Modified: 2026-02-05T21:37:01.000
Link: CVE-2026-23520
No data.
OpenCVE Enrichment
Updated: 2026-04-18T06:15:15Z
Github GHSA