Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/nicolargo/glances/commit/208d876118fea5758970f33fd7474908bd403d25 | Patch |
| https://github.com/nicolargo/glances/releases/tag/v4.5.2 | Product Release Notes |
| https://github.com/nicolargo/glances/security/advisories/GHSA-wvxv-4j8q-4wjq | Exploit Vendor Advisory |
Configurations
History
18 Mar 2026, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Nicolargo glances
Nicolargo |
|
| CPE | cpe:2.3:a:nicolargo:glances:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/nicolargo/glances/commit/208d876118fea5758970f33fd7474908bd403d25 - Patch | |
| References | () https://github.com/nicolargo/glances/releases/tag/v4.5.2 - Product, Release Notes | |
| References | () https://github.com/nicolargo/glances/security/advisories/GHSA-wvxv-4j8q-4wjq - Exploit, Vendor Advisory |
18 Mar 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 06:16
Updated : 2026-03-18 18:33
NVD link : CVE-2026-32596
Mitre link : CVE-2026-32596
CVE.ORG link : CVE-2026-32596
JSON object : View
Products Affected
nicolargo
- glances
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
