Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.
References
| Link | Resource |
|---|---|
| https://github.com/nicolargo/glances/commit/306a7136154ba5c1531489c99f8306d84eae37da | Patch |
| https://github.com/nicolargo/glances/releases/tag/v4.5.1 | Product |
| https://github.com/nicolargo/glances/security/advisories/GHSA-gh4x-f7cq-wwx6 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-10 18:18
Updated : 2026-03-17 16:20
NVD link : CVE-2026-30928
Mitre link : CVE-2026-30928
CVE.ORG link : CVE-2026-30928
JSON object : View
Products Affected
nicolargo
- glances
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
