CVE-2026-30930: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in nicolargo glances
CVE-2026-30930 is a high-severity SQL injection vulnerability in the open-source system monitoring tool Glances, affecting versions prior to 4. 5. 1. The TimescaleDB export module improperly constructs SQL queries by concatenating unsanitized system monitoring data, such as process names or filesystem mount points, without escaping embedded single quotes. This flaw allows attackers to inject malicious SQL commands, potentially compromising the confidentiality, integrity, and availability of the database. The vulnerability does not require authentication or user interaction and has a CVSS 4. 0 score of 7. 3. It is fixed in Glances version 4. 5.
AI Analysis
Technical Summary
Glances is a widely used open-source cross-platform system monitoring tool that provides real-time information about system resources. Prior to version 4.5.1, its TimescaleDB export module constructs SQL queries by concatenating strings containing system monitoring data without proper sanitization. Specifically, the normalize() method wraps string values in single quotes but fails to escape embedded single quotes within these values. Because system monitoring data can include attacker-controlled inputs such as process names, filesystem mount points, network interface names, or container names, this improper neutralization of special elements leads to a classic SQL injection vulnerability (CWE-89). An attacker able to influence these data fields can inject arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or denial of service. The vulnerability is notable because it requires no authentication or user interaction, making exploitation easier in environments where Glances is deployed with TimescaleDB export enabled. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits are reported in the wild, the vulnerability is critical enough to warrant immediate patching. The issue is resolved in Glances version 4.5.1 by properly escaping embedded single quotes in SQL queries, preventing injection attacks.
Potential Impact
The SQL injection vulnerability in Glances' TimescaleDB export module can have severe consequences for organizations. Exploitation could allow attackers to execute arbitrary SQL commands on the TimescaleDB database, leading to unauthorized disclosure of sensitive monitoring data, alteration or deletion of records, or disruption of monitoring services. This could undermine system visibility, hinder incident response, and potentially serve as a pivot point for further attacks within the network. Since Glances is often deployed in critical infrastructure, cloud environments, and enterprise systems for real-time monitoring, the compromise of its database integrity and availability can impact operational stability and security posture. The lack of required authentication and user interaction increases the risk of exploitation in environments where untrusted data can be injected into monitored system parameters. Organizations relying on Glances for monitoring and analytics must consider the potential for data breaches, loss of monitoring fidelity, and operational downtime if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Glances to version 4.5.1 or later, where the SQL injection flaw is fixed by proper escaping of special characters in SQL queries. If upgrading is temporarily not feasible, organizations should disable the TimescaleDB export module to prevent exposure. Additionally, implement strict input validation and sanitization on any user-controllable or external data sources feeding into Glances monitoring parameters. Restrict database user privileges associated with Glances to the minimum necessary, avoiding excessive permissions that could amplify damage from SQL injection. Monitor database logs for suspicious queries indicative of injection attempts. Employ network segmentation and access controls to limit exposure of the TimescaleDB instance. Regularly audit and update monitoring tools and dependencies to ensure timely application of security patches. Finally, consider deploying Web Application Firewalls (WAFs) or database activity monitoring solutions that can detect and block SQL injection patterns targeting the monitoring infrastructure.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Canada, Australia, Netherlands, India, South Korea
CVE-2026-30930: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in nicolargo glances
Description
CVE-2026-30930 is a high-severity SQL injection vulnerability in the open-source system monitoring tool Glances, affecting versions prior to 4. 5. 1. The TimescaleDB export module improperly constructs SQL queries by concatenating unsanitized system monitoring data, such as process names or filesystem mount points, without escaping embedded single quotes. This flaw allows attackers to inject malicious SQL commands, potentially compromising the confidentiality, integrity, and availability of the database. The vulnerability does not require authentication or user interaction and has a CVSS 4. 0 score of 7. 3. It is fixed in Glances version 4. 5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Glances is a widely used open-source cross-platform system monitoring tool that provides real-time information about system resources. Prior to version 4.5.1, its TimescaleDB export module constructs SQL queries by concatenating strings containing system monitoring data without proper sanitization. Specifically, the normalize() method wraps string values in single quotes but fails to escape embedded single quotes within these values. Because system monitoring data can include attacker-controlled inputs such as process names, filesystem mount points, network interface names, or container names, this improper neutralization of special elements leads to a classic SQL injection vulnerability (CWE-89). An attacker able to influence these data fields can inject arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or denial of service. The vulnerability is notable because it requires no authentication or user interaction, making exploitation easier in environments where Glances is deployed with TimescaleDB export enabled. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits are reported in the wild, the vulnerability is critical enough to warrant immediate patching. The issue is resolved in Glances version 4.5.1 by properly escaping embedded single quotes in SQL queries, preventing injection attacks.
Potential Impact
The SQL injection vulnerability in Glances' TimescaleDB export module can have severe consequences for organizations. Exploitation could allow attackers to execute arbitrary SQL commands on the TimescaleDB database, leading to unauthorized disclosure of sensitive monitoring data, alteration or deletion of records, or disruption of monitoring services. This could undermine system visibility, hinder incident response, and potentially serve as a pivot point for further attacks within the network. Since Glances is often deployed in critical infrastructure, cloud environments, and enterprise systems for real-time monitoring, the compromise of its database integrity and availability can impact operational stability and security posture. The lack of required authentication and user interaction increases the risk of exploitation in environments where untrusted data can be injected into monitored system parameters. Organizations relying on Glances for monitoring and analytics must consider the potential for data breaches, loss of monitoring fidelity, and operational downtime if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Glances to version 4.5.1 or later, where the SQL injection flaw is fixed by proper escaping of special characters in SQL queries. If upgrading is temporarily not feasible, organizations should disable the TimescaleDB export module to prevent exposure. Additionally, implement strict input validation and sanitization on any user-controllable or external data sources feeding into Glances monitoring parameters. Restrict database user privileges associated with Glances to the minimum necessary, avoiding excessive permissions that could amplify damage from SQL injection. Monitor database logs for suspicious queries indicative of injection attempts. Employ network segmentation and access controls to limit exposure of the TimescaleDB instance. Regularly audit and update monitoring tools and dependencies to ensure timely application of security patches. Finally, consider deploying Web Application Firewalls (WAFs) or database activity monitoring solutions that can detect and block SQL injection patterns targeting the monitoring infrastructure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-07T16:40:05.885Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b04b8dea502d3aa873bac7
Added to database: 3/10/2026, 4:49:17 PM
Last enriched: 3/17/2026, 7:16:03 PM
Last updated: 4/23/2026, 4:02:20 PM
Views: 131
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.