Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27465: CWE-201: Insertion of Sensitive Information Into Sent Data in fleetdm fleet

0
Low
VulnerabilityCVE-2026-27465cvecve-2026-27465cwe-201
Published: Thu Feb 26 2026 (02/26/2026, 02:54:04 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

Fleet is open source device management software. In versions prior to 4.80.1, a vulnerability in Fleet’s configuration API could expose Google Calendar service account credentials to authenticated users with low-privilege roles. This may allow unauthorized access to Google Calendar resources associated with the service account. Fleet returns configuration data through an API endpoint that is accessible to authenticated users, including those with the lowest-privilege “Observer” role. In affected versions, Google Calendar service account credentials were not properly obfuscated before being returned. As a result, a low-privilege user could retrieve the service account’s private key material. Depending on how the Google Calendar integration is configured, this could allow unauthorized access to calendar data or other Google Workspace resources associated with the service account. This issue does not allow escalation of privileges within Fleet or access to device management functionality. Version 4.80.1 patches the issue. If an immediate upgrade is not possible, administrators should remove the Google Calendar integration from Fleet and rotate the affected Google service account credentials.

AI-Powered Analysis

AILast updated: 02/26/2026, 14:57:52 UTC

Technical Analysis

Fleet is an open-source device management platform used to manage and monitor endpoints. In versions before 4.80.1, a vulnerability (CVE-2026-27465) exists in the configuration API that returns sensitive Google Calendar service account credentials to any authenticated user, including those assigned the lowest privilege role, 'Observer'. The API endpoint responsible for returning configuration data fails to obfuscate or redact the private key material associated with the Google Calendar service account. This flaw stems from CWE-201, which involves the insertion of sensitive information into sent data. As a result, low-privilege users can retrieve the private key and potentially use it to access Google Calendar resources or other Google Workspace assets linked to the compromised service account. Importantly, this vulnerability does not allow attackers to escalate privileges within Fleet or interfere with device management capabilities. The flaw is addressed in Fleet version 4.80.1, which properly restricts access to sensitive credentials. No known exploits are currently reported in the wild. The CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact scope and the requirement for authenticated access.

Potential Impact

The primary impact is unauthorized disclosure of sensitive Google service account credentials to low-privilege authenticated users within Fleet. This could lead to unauthorized access to Google Calendar data or other Google Workspace resources associated with the service account, potentially exposing sensitive organizational scheduling information or other integrated data. However, since the vulnerability does not allow privilege escalation within Fleet or access to device management functions, the risk is contained to the Google Workspace environment linked to the service account. Organizations relying on Fleet’s Google Calendar integration could face confidentiality breaches of calendar data, which might affect operational security and privacy. The impact is mitigated if the Google Calendar integration is not used or if credentials are rotated promptly after exposure. The vulnerability requires authenticated access, limiting exposure to internal or trusted users with Fleet accounts.

Mitigation Recommendations

Administrators should upgrade Fleet to version 4.80.1 or later, which patches the vulnerability by properly restricting access to sensitive Google service account credentials. If immediate upgrading is not feasible, the Google Calendar integration should be disabled or removed from Fleet to prevent exposure. Additionally, affected Google service account credentials must be rotated immediately to invalidate any potentially compromised keys. Organizations should audit user roles and permissions within Fleet to ensure that only necessary users have access, minimizing the risk of credential exposure. Monitoring and logging access to the configuration API endpoint can help detect any unauthorized attempts to retrieve sensitive data. Finally, organizations should review their Google Workspace audit logs for unusual access patterns linked to the service account to identify potential misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.101Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a05b9eb7ef31ef0b68a604

Added to database: 2/26/2026, 2:41:34 PM

Last enriched: 2/26/2026, 2:57:52 PM

Last updated: 2/26/2026, 11:16:15 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses