CVE-2026-27806

Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via exec.Command("expect", "-c", script). Because the password is inserted into Tcl brace-quoted send {%s}, a password containing } terminates the literal and injects arbitrary Tcl commands. Since Orbit runs as root, this allows a local unprivileged user to escalate to root privileges. This vulnerability is fixed in 4.81.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*

History

14 Apr 2026, 19:31

Type Values Removed Values Added
First Time Fleetdm fleet
Fleetdm
CPE cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
References () https://github.com/fleetdm/fleet/security/advisories/GHSA-rphv-h674-5hp2 - () https://github.com/fleetdm/fleet/security/advisories/GHSA-rphv-h674-5hp2 - Vendor Advisory

08 Apr 2026, 19:25

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 19:25

Updated : 2026-04-14 19:31


NVD link : CVE-2026-27806

Mitre link : CVE-2026-27806

CVE.ORG link : CVE-2026-27806


JSON object : View

Products Affected

fleetdm

  • fleet
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')