Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32633— Glances's Browser API Exposes Reusable Downstream Credentials via `/api/4/serverslist`

CVSS 9.1 · Critical EPSS 0.10% · P26
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32633

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Glances's Browser API Exposes Reusable Downstream Credentials via `/api/4/serverslist`
Source: NVD (National Vulnerability Database)
Vulnerability Description
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated in-place during background polling and can contain a `uri` field with embedded HTTP Basic credentials for downstream Glances servers, using the reusable pbkdf2-derived Glances authentication secret. If the front Glances Browser/API instance is started without `--password`, which is supported and common for internal network deployments, `/api/4/serverslist` is completely unauthenticated. Any network user who can reach the Browser API can retrieve reusable credentials for protected downstream Glances servers once they have been polled by the browser instance. Version 4.5.2 fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
glances 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
glances是Nicolas Hennion个人开发者的一款系统监测工具。 glances 4.5.2之前版本存在安全漏洞,该漏洞源于Central Browser模式下/api/4/serverslist端点未经身份验证返回包含嵌入式HTTP基本凭据的服务器对象,可能导致网络用户检索受保护下游服务器的可重用凭据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
nicolargoglances < 4.5.2 -

II. Public POCs for CVE-2026-32633

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32633

登录查看更多情报信息。

Same Patch Batch · nicolargo · 2026-03-18 · 8 CVEs total

CVE-2026-326108.1 HIGHGlances's Default CORS Configuration Allows Cross-Origin Credential Theft
CVE-2026-326348.1 HIGHGlances Central Browser Autodiscovery Leaks Reusable Credentials to Zeroconf-Spoofed Serve
CVE-2026-326097.5 HIGHGlances has Incomplete Secrets Redaction: /api/v4/args Endpoint Leaks Password Hash and SN
CVE-2026-326087.0 HIGHGlances has a Command Injection via Process Names in Action Command Templates
CVE-2026-326117.0 HIGHGlances has a SQL Injection in DuckDB Export via Unparameterized DDL Statements
CVE-2026-326325.9 MEDIUMGlances's REST/WebUI Lacks Host Validation and Remains Exposed to DNS Rebinding
CVE-2026-32596Glances exposes the REST API without authentication

IV. Related Vulnerabilities

V. Comments for CVE-2026-32633

No comments yet


Leave a comment