๐Ÿ” CVE Alert

CVE-2026-35587

UNKNOWN 0.0

Glances IP Plugin has SSRF via public_api that leads to credential leakage

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, a Server-Side Request Forgery (SSRF) vulnerability exists in the Glances IP plugin due to improper validation of the public_api configuration parameter. The value of public_api is used directly in outbound HTTP requests without any scheme restriction or hostname/IP validation. An attacker who can modify the Glances configuration can force the application to send requests to arbitrary internal or external endpoints. Additionally, when public_username and public_password are set, Glances automatically includes these credentials in the Authorization: Basic header, resulting in credential leakage to attacker-controlled servers. This vulnerability can be exploited to access internal network services, retrieve sensitive data from cloud metadata endpoints, and/or exfiltrate credentials via outbound HTTP requests. The issue arises because public_api is passed directly to the HTTP client (urlopen_auth) without validation, allowing unrestricted outbound connections and unintended disclosure of sensitive information. Version 4.5.4 contains a patch.

CWE CWE-918
Vendor nicolargo
Product glances
Published Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for nicolargo glances

Be the first to know when new unknown vulnerabilities affecting nicolargo glances are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

nicolargo / glances
< 4.5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nicolargo/glances/security/advisories/GHSA-g5pq-48mj-jvw8 github.com: https://github.com/nicolargo/glances/commit/d6808be66728956477cc4b544bab1acd71ac65fb