Sensitive Configuration Leak in Glances Open-Source Monitoring Tool
CVE-2026-30928

8.7HIGH

Key Information:

Vendor

Nicolargo

Status
Vendor
CVE Published:
10 March 2026

What is CVE-2026-30928?

The Glances open-source monitoring tool contains a significant vulnerability where the /api/4/config endpoint, prior to version 4.5.1, reveals the entire parsed configuration file, glances.conf, without any filtering of sensitive information. This oversight includes critical credentials such as database passwords, API tokens, JWT signing keys, and SSL key passwords, which could be exploited by unauthorized users. Users are strongly advised to upgrade to version 4.5.1 or later to mitigate this risk and protect sensitive data from exposure.

Affected Version(s)

glances < 4.5.1

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.