Home

Description

Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.

PUBLISHED Reserved 2026-03-12 | Published 2026-03-18 | Updated 2026-03-18 | Assigner GitHub_M




HIGH: 7.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 4.5.2
affected

References

github.com/...lances/security/advisories/GHSA-49g7-2ww7-3vf5 exploit

github.com/...lances/security/advisories/GHSA-49g7-2ww7-3vf5

github.com/...ommit/63b7da28895249d775202d639e5531ba63491a5c

github.com/nicolargo/glances/releases/tag/v4.5.2

cve.org (CVE-2026-32611)

nvd.nist.gov (CVE-2026-32611)

Download JSON