The vulnerability is an unauthenticated exposure of sensitive configuration secrets in the Glances monitoring tool. The root cause lies in the Config.as_dict method, which reads the entire glances.conf file, including database passwords, API tokens, and other credentials, and returns it as a raw dictionary. This sensitive data is then exposed through several unauthenticated API endpoints (_api_config, _api_config_section, _api_config_section_item) handled by the GlancesRestfulApi class. If Glances is started in web server mode (-w) without a master password, these endpoints are accessible to any user on the network, allowing them to retrieve all secrets. The patch addresses this by creating a new, sanitized method Config.as_dict_secure that redacts sensitive information. The API endpoints are modified to use this secure method for unauthenticated requests, while the original as_dict method is only used for authenticated sessions, thus preventing the information leak.