| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9p23-p2m4-2r4m | Fleet vulnerable to SQL Injection in MDM bootstrap package by authenticated team or global admin |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 31 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fleetdm
Fleetdm fleet |
|
| Vendors & Products |
Fleetdm
Fleetdm fleet |
Fri, 27 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fleet is open source device management software. Prior to 4.81.0, a SQL injection vulnerability in Fleet's MDM bootstrap package configuration allows an authenticated user with Team Admin or Global Admin privileges to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject arbitrary content into team configs via direct API calls. Version 4.81.0 patches the issue. | |
| Title | Fleet vulnerable to SQL injection in MDM bootstrap package by authenticated team or global admin | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T19:02:07.123Z
Reserved: 2026-03-27T13:45:29.619Z
Link: CVE-2026-34386
Updated: 2026-03-30T19:02:03.043Z
Status : Analyzed
Published: 2026-03-27T19:16:43.427
Modified: 2026-04-02T17:04:41.347
Link: CVE-2026-34386
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:00:51Z
Github GHSA