CVE-2026-23520

Arcane RCE: When Docker Labels Become Shell Scripts

Alon Barad
Alon Barad
Software Engineer

Jan 16, 2026·6 min read·22 visits

Executive Summary (TL;DR)

Arcane trusted Docker labels to define 'pre-update' and 'post-update' commands. It passed these label values directly to `/bin/sh -c`. An authenticated attacker can create a project with a malicious label, wait for an admin to update the container, and gain Remote Code Execution (RCE) on the management server. The vendor fixed this by deleting the feature entirely.

A critical OS Command Injection vulnerability in the Arcane Docker management platform allows authenticated users to execute arbitrary commands on the backend server. By crafting malicious Docker labels designed for lifecycle hooks, attackers can trick the updater service into passing unsanitized strings directly to a shell interpreter.

Fix Analysis (1)

Technical Appendix

CVSS Score
9.1/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Probability
4.00%
Top 99% most exploited
150
via Shodan

Affected Systems

Arcane Docker Management Platform

Affected Versions Detail

Product
Affected Versions
Fixed Version
Arcane
getarcaneapp
< 1.13.01.13.0
AttributeDetail
CWE IDCWE-78 (OS Command Injection)
CVSS Score9.1 (Critical)
Attack VectorNetwork
Privileges RequiredLow (Authenticated)
User InteractionRequired (Admin triggers update)
Sink/bin/sh -c
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command.

Vulnerability Timeline

Vulnerability identified and patch committed
2026-01-14
Public release of Arcane v1.13.0
2026-01-15
GHSA and CVE advisory published
2026-01-15