CVE-2026-34386

Fleet is open source device management software. Prior to 4.81.0, a SQL injection vulnerability in Fleet's MDM bootstrap package configuration allows an authenticated user with Team Admin or Global Admin privileges to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject arbitrary content into team configs via direct API calls. Version 4.81.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*

History

02 Apr 2026, 17:04

Type Values Removed Values Added
References () https://github.com/fleetdm/fleet/security/advisories/GHSA-9p23-p2m4-2r4m - () https://github.com/fleetdm/fleet/security/advisories/GHSA-9p23-p2m4-2r4m - Vendor Advisory
CPE cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
First Time Fleetdm fleet
Fleetdm
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

27 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 19:16

Updated : 2026-04-02 17:04


NVD link : CVE-2026-34386

Mitre link : CVE-2026-34386

CVE.ORG link : CVE-2026-34386


JSON object : View

Products Affected

fleetdm

  • fleet
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')