Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25963: CWE-863: Incorrect Authorization in fleetdm fleet

0
Low
VulnerabilityCVE-2026-25963cvecve-2026-25963cwe-863
Published: Thu Feb 26 2026 (02/26/2026, 02:49:21 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

Fleet is open source device management software. In versions prior to 4.80.1, a broken authorization check in Fleet’s certificate template deletion API could allow a team administrator to delete certificate templates belonging to other teams within the same Fleet instance. Fleet supports certificate templates that are scoped to individual teams. In affected versions, the batch deletion endpoint validated authorization using a user-supplied team identifier but did not verify that the certificate template IDs being deleted actually belonged to that team. As a result, a team administrator could delete certificate templates associated with other teams, potentially disrupting certificate-based workflows such as device enrollment, Wi-Fi authentication, VPN access, or other certificate-dependent configurations for the affected teams. This issue does not allow privilege escalation, access to sensitive data, or compromise of Fleet’s control plane. Impact is limited to integrity and availability of certificate templates across teams. Version 4.80.1 patches the issue. If an immediate upgrade is not possible, administrators should restrict access to certificate template management to trusted users and avoid delegating team administrator permissions where not strictly required.

AI-Powered Analysis

AILast updated: 02/26/2026, 14:58:04 UTC

Technical Analysis

Fleet is an open-source device management platform that supports certificate templates scoped to individual teams. In versions before 4.80.1, the batch deletion API endpoint for certificate templates suffers from an incorrect authorization check (CWE-863). Specifically, the API validates authorization based on a user-supplied team identifier but fails to verify that the certificate template IDs being deleted actually belong to that team. Consequently, a team administrator can delete certificate templates associated with other teams within the same Fleet instance. This vulnerability impacts the integrity and availability of certificate templates, which are critical for certificate-based workflows such as device enrollment, Wi-Fi authentication, and VPN access. However, it does not allow privilege escalation, access to sensitive data, or compromise of Fleet’s control plane. The CVSS 4.0 score is 1.2 (low severity), reflecting the limited impact and the requirement for team administrator privileges to exploit. The flaw was publicly disclosed and patched in version 4.80.1. No known exploits are reported in the wild. Mitigation involves upgrading to the patched version or restricting certificate template management access to trusted users and minimizing delegation of team administrator roles.

Potential Impact

The primary impact is on the integrity and availability of certificate templates across teams within a Fleet instance. Unauthorized deletion of certificate templates can disrupt critical certificate-dependent workflows such as device enrollment, Wi-Fi authentication, and VPN access, potentially causing operational downtime or degraded security posture for affected teams. Since the vulnerability does not allow privilege escalation or data exposure, the confidentiality and control plane integrity remain intact. However, organizations relying heavily on Fleet for device and certificate management may experience interruptions in their security infrastructure and device provisioning processes. The impact is limited to multi-team Fleet deployments where team administrators have deletion privileges, and the vulnerability requires authenticated access with elevated permissions, reducing the risk of widespread exploitation.

Mitigation Recommendations

The definitive mitigation is to upgrade Fleet to version 4.80.1 or later, where the authorization check is properly enforced. If immediate upgrading is not feasible, organizations should implement strict access controls by limiting certificate template management permissions to highly trusted users only. Avoid delegating team administrator privileges unless absolutely necessary, and regularly audit team administrator roles and actions. Additionally, monitoring deletion API calls and certificate template inventories can help detect unauthorized deletions early. Implementing role-based access controls (RBAC) with the principle of least privilege and segregating teams to minimize cross-team administrative overlap will further reduce risk. Finally, organizations should maintain backups of certificate templates to enable recovery in case of accidental or malicious deletions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:13:54.066Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a05b9eb7ef31ef0b68a601

Added to database: 2/26/2026, 2:41:34 PM

Last enriched: 2/26/2026, 2:58:04 PM

Last updated: 2/26/2026, 10:48:12 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses