Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30930: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in nicolargo glances

0
High
VulnerabilityCVE-2026-30930cvecve-2026-30930cwe-89
Published: Tue Mar 10 2026 (03/10/2026, 16:16:59 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

CVE-2026-30930 is a high-severity SQL injection vulnerability in the open-source system monitoring tool Glances, affecting versions prior to 4. 5. 1. The TimescaleDB export module improperly constructs SQL queries by concatenating unsanitized system monitoring data, such as process names or filesystem mount points, without escaping embedded single quotes. This flaw allows attackers to inject malicious SQL commands, potentially compromising the confidentiality, integrity, and availability of the database. The vulnerability does not require authentication or user interaction and has a CVSS 4. 0 score of 7. 3. It is fixed in Glances version 4. 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 19:16:03 UTC

Technical Analysis

Glances is a widely used open-source cross-platform system monitoring tool that provides real-time information about system resources. Prior to version 4.5.1, its TimescaleDB export module constructs SQL queries by concatenating strings containing system monitoring data without proper sanitization. Specifically, the normalize() method wraps string values in single quotes but fails to escape embedded single quotes within these values. Because system monitoring data can include attacker-controlled inputs such as process names, filesystem mount points, network interface names, or container names, this improper neutralization of special elements leads to a classic SQL injection vulnerability (CWE-89). An attacker able to influence these data fields can inject arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or denial of service. The vulnerability is notable because it requires no authentication or user interaction, making exploitation easier in environments where Glances is deployed with TimescaleDB export enabled. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits are reported in the wild, the vulnerability is critical enough to warrant immediate patching. The issue is resolved in Glances version 4.5.1 by properly escaping embedded single quotes in SQL queries, preventing injection attacks.

Potential Impact

The SQL injection vulnerability in Glances' TimescaleDB export module can have severe consequences for organizations. Exploitation could allow attackers to execute arbitrary SQL commands on the TimescaleDB database, leading to unauthorized disclosure of sensitive monitoring data, alteration or deletion of records, or disruption of monitoring services. This could undermine system visibility, hinder incident response, and potentially serve as a pivot point for further attacks within the network. Since Glances is often deployed in critical infrastructure, cloud environments, and enterprise systems for real-time monitoring, the compromise of its database integrity and availability can impact operational stability and security posture. The lack of required authentication and user interaction increases the risk of exploitation in environments where untrusted data can be injected into monitored system parameters. Organizations relying on Glances for monitoring and analytics must consider the potential for data breaches, loss of monitoring fidelity, and operational downtime if this vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Glances to version 4.5.1 or later, where the SQL injection flaw is fixed by proper escaping of special characters in SQL queries. If upgrading is temporarily not feasible, organizations should disable the TimescaleDB export module to prevent exposure. Additionally, implement strict input validation and sanitization on any user-controllable or external data sources feeding into Glances monitoring parameters. Restrict database user privileges associated with Glances to the minimum necessary, avoiding excessive permissions that could amplify damage from SQL injection. Monitor database logs for suspicious queries indicative of injection attempts. Employ network segmentation and access controls to limit exposure of the TimescaleDB instance. Regularly audit and update monitoring tools and dependencies to ensure timely application of security patches. Finally, consider deploying Web Application Firewalls (WAFs) or database activity monitoring solutions that can detect and block SQL injection patterns targeting the monitoring infrastructure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T16:40:05.885Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b04b8dea502d3aa873bac7

Added to database: 3/10/2026, 4:49:17 PM

Last enriched: 3/17/2026, 7:16:03 PM

Last updated: 4/23/2026, 4:02:20 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses