Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33533: CWE-942: Permissive Cross-domain Policy with Untrusted Domains in nicolargo glances

0
High
VulnerabilityCVE-2026-33533cvecve-2026-33533cwe-942
Published: Thu Apr 02 2026 (04/02/2026, 14:56:38 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, the Glances XML-RPC server (activated with glances -s or glances --server) sends Access-Control-Allow-Origin: * on every HTTP response. Because the XML-RPC handler does not validate the Content-Type header, an attacker-controlled webpage can issue a CORS "simple request" (POST with Content-Type: text/plain) containing a valid XML-RPC payload. The browser sends the request without a preflight check, the server processes the XML body and returns the full system monitoring dataset, and the wildcard CORS header lets the attacker's JavaScript read the response. The result is complete exfiltration of hostname, OS version, IP addresses, CPU/memory/disk/network stats, and the full process list including command lines (which often contain tokens, passwords, or internal paths). This issue has been patched in version 4.5.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 15:39:16 UTC

Technical Analysis

Glances is a cross-platform system monitoring tool that provides real-time system metrics via an XML-RPC server interface when started with the -s or --server option. Prior to version 4.5.3, this XML-RPC server responds to all HTTP requests with the header Access-Control-Allow-Origin: *, which allows any origin to access the server's responses through browsers. The vulnerability arises because the XML-RPC handler does not validate the Content-Type header of incoming requests. An attacker can craft a malicious webpage that issues a CORS simple POST request with Content-Type set to text/plain containing a valid XML-RPC payload. Since simple requests do not trigger CORS preflight checks, the browser sends the request directly to the Glances server. The server processes the XML-RPC payload and returns detailed system monitoring data in the response. Due to the wildcard CORS header, the attacker's JavaScript can read this response, effectively exfiltrating sensitive system information. The data exposed includes hostname, operating system version, network interface IP addresses, CPU, memory, disk, and network statistics, and critically, the full list of running processes with their command lines. Command lines often contain sensitive information such as tokens, passwords, or internal file paths, increasing the risk of further compromise. This vulnerability is classified under CWE-942 (Permissive Cross-domain Policy with Untrusted Domains). It requires no authentication but does require the victim to visit a malicious webpage, making it a cross-origin data theft vulnerability. The issue was fixed in Glances version 4.5.3 by restricting the CORS policy and validating request headers appropriately. No known exploits in the wild have been reported as of the publication date.

Potential Impact

The vulnerability allows remote attackers to exfiltrate comprehensive system information from vulnerable Glances servers without authentication. This can lead to significant confidentiality breaches, exposing sensitive operational data such as system configuration, network details, and running processes. The exposure of command line arguments is particularly dangerous as it may reveal credentials, tokens, or internal paths, facilitating further attacks such as lateral movement, privilege escalation, or targeted exploitation. Organizations running Glances with the XML-RPC server enabled on publicly accessible or intranet-facing hosts are at risk. The attack requires user interaction (visiting a malicious webpage), so phishing or social engineering could be used to trigger exploitation. The broad data exposure can aid attackers in reconnaissance and planning of subsequent attacks, increasing the overall risk posture. Although no direct integrity or availability impact is described, the confidentiality breach alone is severe. The vulnerability affects all platforms supported by Glances, including Linux, Windows, and macOS, potentially impacting diverse environments. Given the ease of exploitation and sensitive data exposure, the impact is high for affected organizations.

Mitigation Recommendations

1. Upgrade Glances to version 4.5.3 or later, where the vulnerability is patched with proper CORS policy restrictions and request validation. 2. If upgrading immediately is not possible, disable the XML-RPC server functionality by avoiding the use of the -s or --server options to prevent exposure. 3. Restrict network access to the Glances server interface using firewall rules or network segmentation to limit exposure to trusted hosts only. 4. Implement web application firewall (WAF) rules to detect and block suspicious cross-origin POST requests with XML-RPC payloads targeting the Glances server port. 5. Monitor network traffic and logs for unusual requests to the Glances server, especially POST requests with text/plain Content-Type and XML payloads. 6. Educate users about the risks of visiting untrusted websites that could host malicious scripts exploiting this vulnerability. 7. Review and rotate any credentials or tokens that may have been exposed if exploitation is suspected. 8. Consider deploying Content Security Policy (CSP) headers on internal web portals to reduce the risk of malicious script execution. These steps collectively reduce the attack surface and limit the potential for data exfiltration via this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T18:05:11.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ce866ce6bfc5ba1de33603

Added to database: 4/2/2026, 3:08:28 PM

Last enriched: 4/2/2026, 3:39:16 PM

Last updated: 4/3/2026, 7:09:14 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses