CVE-2026-23520

9.0 CRITICAL

📋 TL;DR

CVE-2026-23520 is a command injection vulnerability in Arcane's docker management platform that allows authenticated users to execute arbitrary shell commands on the host system. The vulnerability occurs when lifecycle labels containing malicious commands are processed during container updates. Any organization running Arcane versions before 1.13.0 with authenticated user access is affected.

💻 Affected Systems

Products:
  • Arcane Docker Management Platform
Versions: All versions prior to 1.13.0
Operating Systems: Linux, Any OS running Docker containers
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires authenticated user access and administrator-triggered container updates to execute the malicious command.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with container privileges, potentially leading to data exfiltration, ransomware deployment, or complete system takeover.

🟠

Likely Case

Privilege escalation from authenticated user to container execution context, enabling lateral movement, data access, and persistence mechanisms within the container environment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and container security controls are implemented, potentially containing the exploit to isolated environments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access to create projects with malicious lifecycle labels, then waiting for administrator-triggered updates.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13.0

Vendor Advisory: https://github.com/getarcaneapp/arcane/security/advisories/GHSA-gjqq-6r35-w3r8

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Stop Arcane services. 3. Update to version 1.13.0 using official package or container image. 4. Restart Arcane services. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Project Creation

all

Limit project creation to administrators only through access controls.

# Configure RBAC to restrict project creation to admin users only

Disable Scheduled Updates

all

Temporarily disable automatic container updates to prevent trigger conditions.

# Set update checks to manual only in Arcane configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Arcane instances from critical systems
  • Enforce least privilege access controls and audit all authenticated user activities

🔍 How to Verify

Check if Vulnerable:

Check Arcane version: if version < 1.13.0, system is vulnerable. Review project configurations for suspicious lifecycle labels.

Check Version:

docker inspect arcane | grep -i version OR check Arcane web interface version display

Verify Fix Applied:

Confirm Arcane version is 1.13.0 or later. Test that lifecycle labels are properly sanitized during container updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shell command execution in container logs
  • Suspicious lifecycle label modifications in audit logs
  • Unexpected process creation during container updates

Network Indicators:

  • Outbound connections from containers to unexpected destinations during update cycles
  • Command and control traffic patterns

SIEM Query:

source="arcane" AND (event="container_update" OR event="lifecycle_execution") AND command="*;*" OR command="*|*" OR command="*&*"

🔗 References

📤 Share & Export