DNS Rebinding Vulnerability in Glances Monitoring Tool by Nicolargo
CVE-2026-32632

5.9MEDIUM

Key Information:

Vendor

Nicolargo

Status
Vendor
CVE Published:
18 March 2026

What is CVE-2026-32632?

Glances, a versatile open-source cross-platform monitoring tool, has a vulnerability that allows attackers to exploit DNS rebinding. Before version 4.5.2, its REST API and WebUI accept arbitrary 'Host' headers without applying necessary security measures like 'TrustedHostMiddleware.' Consequently, attacker-controlled domains can gain access to these endpoints through DNS rebinding attacks, bypassing the same-origin policy protections. This security flaw highlights the importance of proper host allowlisting to safeguard against unauthorized access within network environments.

Affected Version(s)

glances < 4.5.2

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.