CVE-2026-32611

HIGH

Glances has a SQL Injection in DuckDB Export via Unparameterized DDL Statements

Title source: cna
STIX 2.1

Description

Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.

Scores

CVSS v3 7.0
EPSS 0.0002
EPSS Percentile 4.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (2)
nicolargo/glances < 4.5.2 (2 CPE variants)
pypi/Glances 0 - 4.5.2PyPI
Published Mar 18, 2026
Tracked Since Mar 18, 2026