Home

Description

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.

PUBLISHED Reserved 2026-03-07 | Published 2026-03-10 | Updated 2026-03-10 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 4.5.1
affected

References

github.com/...lances/security/advisories/GHSA-gh4x-f7cq-wwx6

github.com/...ommit/306a7136154ba5c1531489c99f8306d84eae37da

github.com/nicolargo/glances/releases/tag/v4.5.1

cve.org (CVE-2026-30928)

nvd.nist.gov (CVE-2026-30928)

Download JSON