CVE-2026-32633

NameCVE-2026-32633
DescriptionGlances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated in-place during background polling and can contain a `uri` field with embedded HTTP Basic credentials for downstream Glances servers, using the reusable pbkdf2-derived Glances authentication secret. If the front Glances Browser/API instance is started without `--password`, which is supported and common for internal network deployments, `/api/4/serverslist` is completely unauthenticated. Any network user who can reach the Browser API can retrieve reusable credentials for protected downstream Glances servers once they have been polled by the browser instance. Version 4.5.2 fixes the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glances (PTS)bookworm3.3.1.1+dfsg-1vulnerable
trixie4.3.1+dfsg-1vulnerable
forky4.5.1+dfsg-1vulnerable
sid4.5.2+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glancessource(unstable)4.5.2+dfsg-1

Notes

https://github.com/nicolargo/glances/security/advisories/GHSA-r297-p3v4-wp8m
Fixed by: https://github.com/nicolargo/glances/commit/ee4fab4c32949bfc58992fa0ec99d3bbaa535644 (v4.5.2)

Search for package or bug name: Reporting problems