Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32611: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in nicolargo glances

0
High
VulnerabilityCVE-2026-32611cvecve-2026-32611cwe-89
Published: Wed Mar 18 2026 (03/18/2026, 17:21:18 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.

AI-Powered Analysis

AILast updated: 03/18/2026, 17:43:03 UTC

Technical Analysis

Glances is a widely used open-source cross-platform system monitoring tool that supports exporting monitoring data to various databases, including TimescaleDB and DuckDB. CVE-2026-32611 identifies an SQL injection vulnerability in the DuckDB export module of Glances versions prior to 4.5.2. The root cause lies in the unsafe construction of SQL Data Definition Language (DDL) statements and table/column identifiers using Python f-strings, which directly interpolate monitoring statistics-derived names without proper escaping or parameterization. While the actual data insertion queries use parameterized placeholders, the identifiers in the SQL statements are not sanitized, allowing an attacker to inject malicious SQL code by manipulating these names. This vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The issue was partially addressed in the TimescaleDB export module by converting all SQL operations to parameterized queries and composable objects, but the DuckDB module was overlooked until version 4.5.3. The vulnerability has a CVSS 3.1 base score of 7.0, with network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, high confidentiality impact, low integrity impact, and low availability impact. No known exploits are currently reported in the wild. The flaw could allow remote attackers to execute arbitrary SQL commands, potentially exposing sensitive monitoring data or causing limited disruption to the monitoring database.

Potential Impact

The SQL injection vulnerability in Glances' DuckDB export module can lead to unauthorized disclosure of sensitive system monitoring data, which may include performance metrics, system configurations, or other operational details. Although the integrity and availability impacts are rated low, attackers could manipulate or corrupt monitoring data, potentially misleading system administrators or automated systems relying on this data. Organizations using Glances with DuckDB export in vulnerable versions risk exposure of internal system information, which could be leveraged for further attacks or reconnaissance. Since Glances is used globally across various industries for system monitoring, the vulnerability poses a significant risk to enterprises, cloud providers, and managed service providers that integrate DuckDB for data export. The network-exploitable nature without authentication increases the threat surface, especially in environments where monitoring tools are exposed or accessible remotely. The absence of known exploits suggests limited active exploitation but does not diminish the urgency for remediation given the ease of exploitation and potential data confidentiality impact.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Glances to version 4.5.3 or later, where the DuckDB export module has been fixed to properly parameterize and escape SQL identifiers. Until upgrade is possible, administrators should restrict network access to the Glances monitoring service, ensuring it is not exposed to untrusted networks or users. Implement network segmentation and firewall rules to limit access to the monitoring endpoints. Review and sanitize any custom monitoring statistics or naming conventions that could be manipulated to inject SQL code. Additionally, monitor logs for unusual SQL errors or suspicious activity related to the DuckDB export functionality. Employ runtime application self-protection (RASP) or database activity monitoring (DAM) tools to detect and block anomalous SQL queries. Finally, consider disabling the DuckDB export module if it is not essential to reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.270Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bae0bb771bdb1749b563de

Added to database: 3/18/2026, 5:28:27 PM

Last enriched: 3/18/2026, 5:43:03 PM

Last updated: 3/18/2026, 6:49:40 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses