CVE-2026-32608: Glances has a Command Injection via Process Names in Action Command Templates
(updated )
The Glances action system allows administrators to configure shell commands that execute when monitoring thresholds are exceeded. These commands support Mustache template variables (e.g., {{name}}, {{key}}) that are populated with runtime monitoring data. The secure_popen() function, which executes these commands, implements its own pipe, redirect, and chain operator handling by splitting the command string before passing each segment to subprocess.Popen(shell=False). When a Mustache-rendered value (such as a process name, filesystem mount point, or container name) contains pipe, redirect, or chain metacharacters, the rendered command is split in unintended ways, allowing an attacker who controls a process name or container name to inject arbitrary commands.
References
- github.com/advisories/GHSA-vcv2-q258-wrg7
- github.com/nicolargo/glances
- github.com/nicolargo/glances/commit/6f4ec53d967478e69917078e6f73f448001bf107
- github.com/nicolargo/glances/releases/tag/v4.5.2
- github.com/nicolargo/glances/security/advisories/GHSA-vcv2-q258-wrg7
- nvd.nist.gov/vuln/detail/CVE-2026-32608
Code Behaviors & Features
Detect and mitigate CVE-2026-32608 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →