CVE-2026-32596

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nicolargo:glances:*:*:*:*:*:*:*:*

History

18 Mar 2026, 18:33

Type Values Removed Values Added
First Time Nicolargo glances
Nicolargo
CPE cpe:2.3:a:nicolargo:glances:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/nicolargo/glances/commit/208d876118fea5758970f33fd7474908bd403d25 - () https://github.com/nicolargo/glances/commit/208d876118fea5758970f33fd7474908bd403d25 - Patch
References () https://github.com/nicolargo/glances/releases/tag/v4.5.2 - () https://github.com/nicolargo/glances/releases/tag/v4.5.2 - Product, Release Notes
References () https://github.com/nicolargo/glances/security/advisories/GHSA-wvxv-4j8q-4wjq - () https://github.com/nicolargo/glances/security/advisories/GHSA-wvxv-4j8q-4wjq - Exploit, Vendor Advisory

18 Mar 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 06:16

Updated : 2026-03-18 18:33


NVD link : CVE-2026-32596

Mitre link : CVE-2026-32596

CVE.ORG link : CVE-2026-32596


JSON object : View

Products Affected

nicolargo

  • glances
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor