๐Ÿ” CVE Alert

CVE-2026-32610

HIGH 8.1

Glances's Default CORS Configuration Allows Cross-Origin Credential Theft

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, the Glances REST API web server ships with a default CORS configuration that sets `allow_origins=["*"]` combined with `allow_credentials=True`. When both of these options are enabled together, Starlette's `CORSMiddleware` reflects the requesting `Origin` header value in the `Access-Control-Allow-Origin` response header instead of returning the literal `*` wildcard. This effectively grants any website the ability to make credentialed cross-origin API requests to the Glances server, enabling cross-site data theft of system monitoring information, configuration secrets, and command line arguments from any user who has an active browser session with a Glances instance. Version 4.5.2 fixes the issue.

CWE CWE-942
Vendor nicolargo
Product glances
Published Mar 18, 2026
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for nicolargo glances

Be the first to know when new high vulnerabilities affecting nicolargo glances are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

nicolargo / glances
< 4.5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nicolargo/glances/security/advisories/GHSA-9jfm-9rc6-2hfq github.com: https://github.com/nicolargo/glances/commit/4465169b71d93991f1e49740fe02428291099832 github.com: https://github.com/nicolargo/glances/releases/tag/v4.5.2