Fleet is open source device management software. Prior to 4.81.1, a command injection vulnerability in Fleet's software installer pipeline allows an attacker to achieve arbitrary code execution as root (macOS/Linux) or SYSTEM (Windows) on managed hosts when an uninstall is triggered for a crafted software package. Version 4.81.1 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/fleetdm/fleet/security/advisories/GHSA-7rhw-5mpv-gp4h | Vendor Advisory |
Configurations
History
07 Apr 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/fleetdm/fleet/security/advisories/GHSA-7rhw-5mpv-gp4h - Vendor Advisory | |
| CPE | cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:* | |
| First Time |
Fleetdm fleet
Fleetdm |
27 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 19:16
Updated : 2026-04-07 21:15
NVD link : CVE-2026-34387
Mitre link : CVE-2026-34387
CVE.ORG link : CVE-2026-34387
JSON object : View
Products Affected
fleetdm
- fleet
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
