CVE-2026-34387

Fleet is open source device management software. Prior to 4.81.1, a command injection vulnerability in Fleet's software installer pipeline allows an attacker to achieve arbitrary code execution as root (macOS/Linux) or SYSTEM (Windows) on managed hosts when an uninstall is triggered for a crafted software package. Version 4.81.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*

History

07 Apr 2026, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/fleetdm/fleet/security/advisories/GHSA-7rhw-5mpv-gp4h - () https://github.com/fleetdm/fleet/security/advisories/GHSA-7rhw-5mpv-gp4h - Vendor Advisory
CPE cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
First Time Fleetdm fleet
Fleetdm

27 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 19:16

Updated : 2026-04-07 21:15


NVD link : CVE-2026-34387

Mitre link : CVE-2026-34387

CVE.ORG link : CVE-2026-34387


JSON object : View

Products Affected

fleetdm

  • fleet
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')