CVE-2026-35587: CWE-918: Server-Side Request Forgery (SSRF) in nicolargo glances
A Server-Side Request Forgery (SSRF) vulnerability (CWE-918) exists in the Glances monitoring tool versions prior to 4. 5. 4. The vulnerability arises from improper validation of the public_api configuration parameter, which is used directly in outbound HTTP requests without restrictions. An attacker with the ability to modify the Glances configuration can exploit this to make arbitrary HTTP requests to internal or external endpoints. If public_username and public_password are configured, these credentials may be leaked via the Authorization header to attacker-controlled servers. This can lead to unauthorized access to internal network services and sensitive data exposure. The issue is fixed in Glances version 4. 5. 4.
AI Analysis
Technical Summary
Glances, an open-source cross-platform system monitoring tool, contains a Server-Side Request Forgery vulnerability in its IP plugin prior to version 4.5.4. The vulnerability is due to the public_api configuration parameter being used directly in outbound HTTP requests without validating the URL scheme or hostname/IP. This allows an attacker who can modify the configuration to force Glances to send HTTP requests to arbitrary endpoints, including internal network services or cloud metadata endpoints. Additionally, if public_username and public_password are set, these credentials are included in the Authorization: Basic header, potentially leaking sensitive credentials to attacker-controlled servers. The vulnerability is addressed in version 4.5.4, which includes a patch to validate and restrict the public_api parameter.
Potential Impact
Exploitation of this vulnerability allows an attacker with configuration modification capabilities to make Glances send arbitrary HTTP requests to internal or external systems, potentially accessing internal network services or sensitive cloud metadata endpoints. Credential leakage can occur if authentication credentials are configured, as they are sent in outbound requests to attacker-controlled servers. This can lead to unauthorized data disclosure and further compromise of internal resources. No known exploits in the wild have been reported as of the published date.
Mitigation Recommendations
Upgrade Glances to version 4.5.4 or later, which contains a patch addressing this SSRF vulnerability by validating the public_api configuration parameter. Until upgrading, restrict access to Glances configuration files and interfaces to trusted users only to prevent unauthorized modification. Patch status is not explicitly stated in the vendor advisory, but version 4.5.4 is confirmed to contain the fix.
CVE-2026-35587: CWE-918: Server-Side Request Forgery (SSRF) in nicolargo glances
Description
A Server-Side Request Forgery (SSRF) vulnerability (CWE-918) exists in the Glances monitoring tool versions prior to 4. 5. 4. The vulnerability arises from improper validation of the public_api configuration parameter, which is used directly in outbound HTTP requests without restrictions. An attacker with the ability to modify the Glances configuration can exploit this to make arbitrary HTTP requests to internal or external endpoints. If public_username and public_password are configured, these credentials may be leaked via the Authorization header to attacker-controlled servers. This can lead to unauthorized access to internal network services and sensitive data exposure. The issue is fixed in Glances version 4. 5. 4.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Glances, an open-source cross-platform system monitoring tool, contains a Server-Side Request Forgery vulnerability in its IP plugin prior to version 4.5.4. The vulnerability is due to the public_api configuration parameter being used directly in outbound HTTP requests without validating the URL scheme or hostname/IP. This allows an attacker who can modify the configuration to force Glances to send HTTP requests to arbitrary endpoints, including internal network services or cloud metadata endpoints. Additionally, if public_username and public_password are set, these credentials are included in the Authorization: Basic header, potentially leaking sensitive credentials to attacker-controlled servers. The vulnerability is addressed in version 4.5.4, which includes a patch to validate and restrict the public_api parameter.
Potential Impact
Exploitation of this vulnerability allows an attacker with configuration modification capabilities to make Glances send arbitrary HTTP requests to internal or external systems, potentially accessing internal network services or sensitive cloud metadata endpoints. Credential leakage can occur if authentication credentials are configured, as they are sent in outbound requests to attacker-controlled servers. This can lead to unauthorized data disclosure and further compromise of internal resources. No known exploits in the wild have been reported as of the published date.
Mitigation Recommendations
Upgrade Glances to version 4.5.4 or later, which contains a patch addressing this SSRF vulnerability by validating the public_api configuration parameter. Until upgrading, restrict access to Glances configuration files and interfaces to trusted users only to prevent unauthorized modification. Patch status is not explicitly stated in the vendor advisory, but version 4.5.4 is confirmed to contain the fix.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-03T20:09:02.828Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e6b73b19fe3cd2cd3f2d1b
Added to database: 4/20/2026, 11:31:07 PM
Last enriched: 4/20/2026, 11:46:05 PM
Last updated: 4/21/2026, 1:15:15 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.