{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T23:48:50.588","vulnerabilities":[{"cve":{"id":"CVE-2026-32610","sourceIdentifier":"security-advisories@github.com","published":"2026-03-18T17:16:06.947","lastModified":"2026-03-21T00:16:56.353","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, the Glances REST API web server ships with a default CORS configuration that sets `allow_origins=[\"*\"]` combined with `allow_credentials=True`. When both of these options are enabled together, Starlette's `CORSMiddleware` reflects the requesting `Origin` header value in the `Access-Control-Allow-Origin` response header instead of returning the literal `*` wildcard. This effectively grants any website the ability to make credentialed cross-origin API requests to the Glances server, enabling cross-site data theft of system monitoring information, configuration secrets, and command line arguments from any user who has an active browser session with a Glances instance. Version 4.5.2 fixes the issue."},{"lang":"es","value":"Glances es una herramienta de monitorización de sistemas multiplataforma de código abierto. Antes de la versión 4.5.2, el servidor web de la API REST de Glances se distribuye con una configuración CORS predeterminada que establece `allow_origins=[\"*\"]` combinado con `allow_credentials=True`. Cuando ambas opciones están habilitadas juntas, el `CORSMiddleware` de Starlette refleja el valor del encabezado `Origin` de la solicitud en el encabezado de respuesta `Access-Control-Allow-Origin` en lugar de devolver el comodín literal `*`. Esto otorga efectivamente a cualquier sitio web la capacidad de realizar solicitudes API de origen cruzado con credenciales al servidor de Glances, lo que permite el robo de datos entre sitios de información de monitorización del sistema, secretos de configuración y argumentos de línea de comandos de cualquier usuario que tenga una sesión de navegador activa con una instancia de Glances. La versión 4.5.2 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-942"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nicolargo:glances:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.2","matchCriteriaId":"3FC19E01-80F1-43BB-912C-39FE99143A59"}]}]}],"references":[{"url":"https://github.com/nicolargo/glances/commit/4465169b71d93991f1e49740fe02428291099832","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/nicolargo/glances/releases/tag/v4.5.2","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/nicolargo/glances/security/advisories/GHSA-9jfm-9rc6-2hfq","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}