Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32632: CWE-346: Origin Validation Error in nicolargo glances

0
Medium
VulnerabilityCVE-2026-32632cvecve-2026-32632cwe-346
Published: Wed Mar 18 2026 (03/18/2026, 17:47:25 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

Glances is an open-source system cross-platform monitoring tool. Glances recently added DNS rebinding protection for the MCP endpoint, but prior to version 4.5.2, the main REST/WebUI FastAPI application still accepts arbitrary `Host` headers and does not apply `TrustedHostMiddleware` or an equivalent host allowlist. As a result, the REST API, WebUI, and token endpoint remain reachable through attacker-controlled domains in classic DNS rebinding scenarios. Once the victim browser has rebound the attacker domain to the Glances service, same-origin policy no longer protects the API because the browser considers the rebinding domain to be the origin. This is a distinct issue from the previously reported default CORS weakness. CORS is not required for exploitation here because DNS rebinding causes the victim browser to treat the malicious domain as same-origin with the rebinding target. Version 4.5.2 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 03/18/2026, 18:12:37 UTC

Technical Analysis

Glances is a cross-platform system monitoring tool that exposes a REST API and WebUI for system metrics and management. Prior to version 4.5.2, Glances' main FastAPI application accepted arbitrary Host headers without enforcing TrustedHostMiddleware or a host allowlist, which is critical for validating the origin of incoming requests. Although DNS rebinding protection was added for the MCP endpoint, the REST API, WebUI, and token endpoints remained vulnerable. DNS rebinding attacks exploit the browser's trust in the domain name by causing the victim's browser to resolve an attacker-controlled domain to the internal IP address of the Glances service. Because the browser treats the rebinding domain as the same origin, it bypasses the same-origin policy, allowing the attacker to interact with the API and WebUI as if they were legitimate. This vulnerability is distinct from CORS misconfigurations because it does not rely on cross-origin resource sharing but on origin validation failures. The CVSS 3.1 score is 5.9 (medium), reflecting the network attack vector, high confidentiality impact, low integrity impact, no availability impact, high attack complexity, no privileges required, and required user interaction. No known exploits are reported in the wild yet. The issue was fixed in version 4.5.2 by implementing proper origin validation and host header filtering.

Potential Impact

This vulnerability can lead to unauthorized disclosure of sensitive system monitoring data, including system metrics, running processes, and potentially token information, compromising confidentiality. Attackers can leverage DNS rebinding to bypass browser security policies and interact with the Glances API and WebUI as if they were the legitimate user. Although the integrity and availability impacts are low or none, the exposure of sensitive monitoring data can aid further attacks or reconnaissance. Organizations exposing Glances interfaces to untrusted networks or using it in multi-tenant environments are at higher risk. The requirement for user interaction (visiting a malicious site) limits automated exploitation but does not eliminate risk, especially in targeted phishing or watering hole attacks. The medium CVSS score reflects these factors, but the potential for sensitive data leakage in critical infrastructure environments elevates concern.

Mitigation Recommendations

The primary mitigation is to upgrade Glances to version 4.5.2 or later, which includes patches for proper origin validation and TrustedHostMiddleware enforcement. Until upgrading, organizations should restrict access to Glances interfaces via network segmentation and firewall rules, limiting exposure to trusted internal networks only. Implement DNS rebinding protections at the network level, such as configuring DNS servers to reject suspicious rebinding patterns or using browser security features/extensions that detect rebinding attempts. Additionally, administrators should monitor logs for unusual Host header values or unexpected API access patterns. Educate users to avoid visiting untrusted or suspicious websites that could trigger DNS rebinding attacks. For environments requiring remote access, consider using VPNs or secure tunnels that do not rely on DNS resolution vulnerable to rebinding. Finally, review and harden web server configurations to enforce strict host header validation and origin checks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T15:29:36.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bae7bf771bdb1749b795a3

Added to database: 3/18/2026, 5:58:23 PM

Last enriched: 3/18/2026, 6:12:37 PM

Last updated: 3/19/2026, 5:36:29 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses