Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35587: CWE-918: Server-Side Request Forgery (SSRF) in nicolargo glances

0
High
VulnerabilityCVE-2026-35587cvecve-2026-35587cwe-918
Published: Mon Apr 20 2026 (04/20/2026, 23:19:02 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

A Server-Side Request Forgery (SSRF) vulnerability (CWE-918) exists in the Glances monitoring tool versions prior to 4. 5. 4. The vulnerability arises from improper validation of the public_api configuration parameter, which is used directly in outbound HTTP requests without restrictions. An attacker with the ability to modify the Glances configuration can exploit this to make arbitrary HTTP requests to internal or external endpoints. If public_username and public_password are configured, these credentials may be leaked via the Authorization header to attacker-controlled servers. This can lead to unauthorized access to internal network services and sensitive data exposure. The issue is fixed in Glances version 4. 5. 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/20/2026, 23:46:05 UTC

Technical Analysis

Glances, an open-source cross-platform system monitoring tool, contains a Server-Side Request Forgery vulnerability in its IP plugin prior to version 4.5.4. The vulnerability is due to the public_api configuration parameter being used directly in outbound HTTP requests without validating the URL scheme or hostname/IP. This allows an attacker who can modify the configuration to force Glances to send HTTP requests to arbitrary endpoints, including internal network services or cloud metadata endpoints. Additionally, if public_username and public_password are set, these credentials are included in the Authorization: Basic header, potentially leaking sensitive credentials to attacker-controlled servers. The vulnerability is addressed in version 4.5.4, which includes a patch to validate and restrict the public_api parameter.

Potential Impact

Exploitation of this vulnerability allows an attacker with configuration modification capabilities to make Glances send arbitrary HTTP requests to internal or external systems, potentially accessing internal network services or sensitive cloud metadata endpoints. Credential leakage can occur if authentication credentials are configured, as they are sent in outbound requests to attacker-controlled servers. This can lead to unauthorized data disclosure and further compromise of internal resources. No known exploits in the wild have been reported as of the published date.

Mitigation Recommendations

Upgrade Glances to version 4.5.4 or later, which contains a patch addressing this SSRF vulnerability by validating the public_api configuration parameter. Until upgrading, restrict access to Glances configuration files and interfaces to trusted users only to prevent unauthorized modification. Patch status is not explicitly stated in the vendor advisory, but version 4.5.4 is confirmed to contain the fix.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-04-03T20:09:02.828Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69e6b73b19fe3cd2cd3f2d1b

Added to database: 4/20/2026, 11:31:07 PM

Last enriched: 4/20/2026, 11:46:05 PM

Last updated: 4/21/2026, 1:15:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses