Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.
Cite this page
CVE-2026-30928. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-30928
Use CWE-200, Nicolargo vendor hub and Glances product page to widen CVE-2026-30928 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-32633, CVE-2026-32634 and CVE-2026-32610 for nearby disclosures in the same product family.