High severityNVD Advisory· Published Mar 18, 2026· Updated Mar 18, 2026
Glances exposes the REST API without authentication
CVE-2026-32596
Description
Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with glances -w, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
GlancesPyPI | < 4.5.2 | 4.5.2 |
Affected products
1Patches
1208d876118feMerge branch 'GHSA-wvxv-4j8q-4wjq' into develop
2 files changed · +59 −0
docs/api/restful.rst+43 −0 modified@@ -144,6 +144,49 @@ You can configure JWT settings in the Glances configuration file: **Note:** The token endpoint (``/api/4/token``) does not require authentication. Protected endpoints support both Bearer token and Basic Auth authentication methods. +.. _security: + +Security +-------- + +By default, Glances web server runs **without authentication** and binds to +**all network interfaces** (``0.0.0.0``). This means any client that can reach +the server on the network can access the full REST API, including sensitive +system information such as process command-lines, which may contain credentials +(passwords, API keys, tokens passed as arguments). + +This default is intentional for ease of use on private, trusted networks (home +labs, local machines, internal infrastructure). However, if your Glances +instance is reachable from untrusted networks, you should take the following +precautions: + +**Enable authentication** by starting Glances with the ``--password`` option: + +.. code-block:: bash + + glances -w --password + +**Bind to localhost only** if remote access is not needed: + +.. code-block:: bash + + glances -w --bind 127.0.0.1 + +**Use a reverse proxy** (nginx, Caddy, Apache) with TLS and authentication for +any public-facing or semi-public deployment. This is the recommended approach +for production environments. + +.. code-block:: ini + + # Example: restrict bind to localhost, access via reverse proxy + # In glances.conf: + [outputs] + # Set the bind address to localhost + # then configure your reverse proxy to forward to 127.0.0.1:61208 + +When Glances is started without authentication, a warning message is displayed +at startup to remind you of the risk. + WebUI refresh -------------
glances/outputs/glances_restful_api.py+16 −0 modified@@ -533,6 +533,22 @@ def _router(self) -> APIRouter: # Logo print(self._logo()) + # Security warning if no authentication is configured + if not self.args.password: + is_localhost = self.args.bind_address in ('127.0.0.1', 'localhost', '::1') + warn_lines = [ + "WARNING: Glances web server is running WITHOUT authentication.", + ] + if is_localhost: + warn_lines.append(" Use --password to enable authentication.") + else: + warn_lines.append(" Any client on the network can access system information.") + warn_lines.append(" Use --password to enable authentication or") + warn_lines.append(" --bind 127.0.0.1 to restrict access to localhost.") + warn_lines.append(" See https://glances.readthedocs.io/en/latest/api/restful.html#security") + print('\n'.join(warn_lines) + '\n') + logger.warning("Glances web server is running without authentication") + # Browser WEBUI if hasattr(self.args, 'browser') and self.args.browser: # Template for the root browser.html file
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-wvxv-4j8q-4wjqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32596ghsaADVISORY
- github.com/nicolargo/glances/commit/208d876118fea5758970f33fd7474908bd403d25ghsax_refsource_MISCWEB
- github.com/nicolargo/glances/releases/tag/v4.5.2ghsax_refsource_MISCWEB
- github.com/nicolargo/glances/security/advisories/GHSA-wvxv-4j8q-4wjqghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.