๐Ÿ” CVE Alert

CVE-2026-33533

UNKNOWN 0.0

Glances Vulnerable to Cross-Origin System Information Disclosure via XML-RPC Server CORS Wildcard

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, the Glances XML-RPC server (activated with glances -s or glances --server) sends Access-Control-Allow-Origin: * on every HTTP response. Because the XML-RPC handler does not validate the Content-Type header, an attacker-controlled webpage can issue a CORS "simple request" (POST with Content-Type: text/plain) containing a valid XML-RPC payload. The browser sends the request without a preflight check, the server processes the XML body and returns the full system monitoring dataset, and the wildcard CORS header lets the attacker's JavaScript read the response. The result is complete exfiltration of hostname, OS version, IP addresses, CPU/memory/disk/network stats, and the full process list including command lines (which often contain tokens, passwords, or internal paths). This issue has been patched in version 4.5.3.

CWE CWE-942
Vendor nicolargo
Product glances
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for nicolargo glances

Be the first to know when new unknown vulnerabilities affecting nicolargo glances are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

nicolargo / glances
< 4.5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nicolargo/glances/security/advisories/GHSA-7p93-6934-f4q7 github.com: https://github.com/nicolargo/glances/commit/dcb39c3f12b2a1eec708c58d22d7a1d62bdf5fa1 github.com: https://github.com/nicolargo/glances/releases/tag/v4.5.3