Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22808: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fleetdm fleet

0
Medium
VulnerabilityCVE-2026-22808cvecve-2026-22808cwe-79
Published: Wed Jan 21 2026 (01/21/2026, 21:18:26 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

CVE-2026-22808 is a medium severity cross-site scripting (XSS) vulnerability in fleetdm's open source device management software, fleet, affecting versions prior to 4. 78. 2, 4. 77. 1, 4. 76. 2, 4. 75. 2, and 4. 53.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:46:55 UTC

Technical Analysis

CVE-2026-22808 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the fleetdm fleet device management software. The flaw exists in versions prior to 4.78.2, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, specifically when Windows Mobile Device Management (MDM) is enabled. The vulnerability allows an unauthenticated attacker to inject malicious scripts during web page generation, which can execute in the context of the Fleet administrator's browser. This leads to theft of the administrator's authentication token (FLEET::auth_token) stored in localStorage. With this token, attackers can impersonate the administrator, gaining unauthorized access to the fleet management console. This access enables attackers to view sensitive device data, alter configurations, and potentially disrupt device management operations. Exploitation requires no authentication but does require user interaction, such as the administrator visiting a crafted malicious URL or page. The vulnerability has a CVSS 4.0 base score of 5.5, indicating medium severity, with network attack vector, low attack complexity, and partial required privileges and user interaction. No public exploits have been reported yet. The issue is fixed in the specified patched versions. If patching is not immediately possible, disabling Windows MDM temporarily is recommended to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of device management operations. Fleetdm fleet is used to manage endpoints across enterprises, and unauthorized administrative access could lead to exposure of sensitive device information, unauthorized configuration changes, and potential disruption of endpoint management. This could impact compliance with data protection regulations such as GDPR if personal or sensitive data on managed devices is exposed. Organizations relying on Windows MDM integration with fleet are particularly vulnerable. The medium severity indicates that while the vulnerability is exploitable without authentication, it requires user interaction, somewhat limiting widespread exploitation. However, targeted attacks against administrators could lead to significant operational and security consequences. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

1. Upgrade fleetdm fleet installations immediately to versions 4.78.2, 4.77.1, 4.76.2, 4.75.2, or 4.53.3 or later, which contain the fix for this vulnerability. 2. If immediate upgrading is not feasible, temporarily disable Windows MDM integration within fleet to prevent exploitation. 3. Educate administrators to avoid clicking on untrusted links or visiting suspicious web pages while logged into the fleet management console. 4. Implement Content Security Policy (CSP) headers to reduce the risk of XSS exploitation by restricting script sources. 5. Regularly audit and monitor fleet logs for unusual administrative access patterns that could indicate token theft or misuse. 6. Consider isolating fleet management consoles behind VPNs or restricted network access to reduce exposure to external attackers. 7. Review and limit browser localStorage usage and consider token expiration policies to reduce the window of token misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T22:50:10.288Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697146bc4623b1157ced22dd

Added to database: 1/21/2026, 9:35:56 PM

Last enriched: 1/29/2026, 8:46:55 AM

Last updated: 2/7/2026, 4:00:18 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats