CVE-2026-30928: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in nicolargo glances
Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.
AI Analysis
Technical Summary
Glances is a widely used open-source, cross-platform system monitoring tool that provides real-time information about system resources. Prior to version 4.5.1, the /api/4/config REST API endpoint in Glances returns the entire parsed configuration file (glances.conf) via the self.config.as_dict() method without any filtering or redaction of sensitive data. The configuration file typically contains highly sensitive credentials, including database passwords, API tokens, JWT signing keys, and SSL key passwords. Because the API endpoint does not require authentication and is accessible over the network, an unauthenticated attacker can remotely retrieve these secrets simply by querying the endpoint. This exposure violates the principle of least privilege and confidentiality, potentially allowing attackers to escalate privileges, access backend services, or impersonate legitimate users. The vulnerability is tracked as CVE-2026-30928 with a CVSS 4.0 base score of 8.7 (high severity), reflecting its ease of exploitation (network attack vector, no authentication or user interaction required) and the critical impact on confidentiality. The issue was fixed in Glances version 4.5.1 by implementing proper filtering or redaction of sensitive configuration values before returning the configuration data via the API. No public exploits have been reported yet, but the vulnerability poses a significant risk to any deployment exposing the vulnerable API endpoint.
Potential Impact
The exposure of sensitive credentials through the Glances API endpoint can have severe consequences for organizations worldwide. Attackers gaining access to database passwords and API tokens can infiltrate backend systems, exfiltrate data, or manipulate system operations. Exposure of JWT signing keys compromises authentication mechanisms, enabling attackers to forge tokens and impersonate legitimate users or services. SSL key password exposure can lead to compromise of encrypted communications. Since Glances is often deployed in monitoring and management contexts, attackers could leverage these credentials to pivot within networks, escalate privileges, or disrupt monitoring infrastructure. The vulnerability’s network accessibility and lack of authentication requirements increase the likelihood of exploitation, potentially leading to data breaches, service outages, and loss of trust. Organizations relying on Glances for system monitoring must consider the risk of credential leakage and subsequent attacks on their infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Glances to version 4.5.1 or later, where the issue is fixed. Until upgrading is possible, restrict network access to the /api/4/config endpoint by implementing firewall rules, network segmentation, or API gateway controls to allow only trusted hosts or administrators. Disable or restrict the API endpoint if it is not required. Implement strong network-level authentication and encryption (e.g., VPN, TLS) to protect API communications. Regularly audit and rotate credentials stored in Glances configuration files, especially if exposure is suspected. Monitor logs for unusual access patterns to the API endpoint. Additionally, review and harden the overall deployment environment of Glances to minimize attack surface, including limiting user permissions and applying the principle of least privilege to all services and accounts involved.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-30928: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in nicolargo glances
Description
Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.
AI-Powered Analysis
Technical Analysis
Glances is a widely used open-source, cross-platform system monitoring tool that provides real-time information about system resources. Prior to version 4.5.1, the /api/4/config REST API endpoint in Glances returns the entire parsed configuration file (glances.conf) via the self.config.as_dict() method without any filtering or redaction of sensitive data. The configuration file typically contains highly sensitive credentials, including database passwords, API tokens, JWT signing keys, and SSL key passwords. Because the API endpoint does not require authentication and is accessible over the network, an unauthenticated attacker can remotely retrieve these secrets simply by querying the endpoint. This exposure violates the principle of least privilege and confidentiality, potentially allowing attackers to escalate privileges, access backend services, or impersonate legitimate users. The vulnerability is tracked as CVE-2026-30928 with a CVSS 4.0 base score of 8.7 (high severity), reflecting its ease of exploitation (network attack vector, no authentication or user interaction required) and the critical impact on confidentiality. The issue was fixed in Glances version 4.5.1 by implementing proper filtering or redaction of sensitive configuration values before returning the configuration data via the API. No public exploits have been reported yet, but the vulnerability poses a significant risk to any deployment exposing the vulnerable API endpoint.
Potential Impact
The exposure of sensitive credentials through the Glances API endpoint can have severe consequences for organizations worldwide. Attackers gaining access to database passwords and API tokens can infiltrate backend systems, exfiltrate data, or manipulate system operations. Exposure of JWT signing keys compromises authentication mechanisms, enabling attackers to forge tokens and impersonate legitimate users or services. SSL key password exposure can lead to compromise of encrypted communications. Since Glances is often deployed in monitoring and management contexts, attackers could leverage these credentials to pivot within networks, escalate privileges, or disrupt monitoring infrastructure. The vulnerability’s network accessibility and lack of authentication requirements increase the likelihood of exploitation, potentially leading to data breaches, service outages, and loss of trust. Organizations relying on Glances for system monitoring must consider the risk of credential leakage and subsequent attacks on their infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Glances to version 4.5.1 or later, where the issue is fixed. Until upgrading is possible, restrict network access to the /api/4/config endpoint by implementing firewall rules, network segmentation, or API gateway controls to allow only trusted hosts or administrators. Disable or restrict the API endpoint if it is not required. Implement strong network-level authentication and encryption (e.g., VPN, TLS) to protect API communications. Regularly audit and rotate credentials stored in Glances configuration files, especially if exposure is suspected. Monitor logs for unusual access patterns to the API endpoint. Additionally, review and harden the overall deployment environment of Glances to minimize attack surface, including limiting user permissions and applying the principle of least privilege to all services and accounts involved.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-07T16:40:05.885Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b04b8dea502d3aa873bac2
Added to database: 3/10/2026, 4:49:17 PM
Last enriched: 3/10/2026, 5:04:20 PM
Last updated: 3/10/2026, 7:13:23 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.