Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34386: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fleetdm fleet

0
Medium
VulnerabilityCVE-2026-34386cvecve-2026-34386cwe-89
Published: Fri Mar 27 2026 (03/27/2026, 18:30:10 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

CVE-2026-34386 is a medium-severity SQL injection vulnerability in Fleet, an open source device management software, affecting versions prior to 4. 81. 0. The flaw allows authenticated users with Team Admin or Global Admin privileges to exploit improper neutralization of SQL commands in the MDM bootstrap package configuration. Exploitation enables attackers to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject malicious content via direct API calls. No user interaction or elevated privileges beyond admin roles are required, and the vulnerability does not require network-level authentication beyond these roles. The issue was patched in version 4. 81. 0. While no known exploits are currently reported in the wild, organizations using vulnerable Fleet versions should prioritize updating to mitigate risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:00:28 UTC

Technical Analysis

CVE-2026-34386 is a SQL injection vulnerability classified under CWE-89 affecting Fleet, an open source device management platform widely used for endpoint management. The vulnerability exists in the MDM bootstrap package configuration component prior to version 4.81.0. It arises from improper neutralization of special elements in SQL commands, allowing an authenticated user with Team Admin or Global Admin privileges to craft malicious API requests that manipulate SQL queries executed by the backend database. This enables attackers to alter team configurations arbitrarily, exfiltrate sensitive data stored within the Fleet database, and inject arbitrary content into team configurations. The attack vector requires authentication with elevated privileges but does not require user interaction or network-level authentication beyond these roles. The vulnerability has a CVSS 4.0 score of 6.3, reflecting medium severity with network attack vector, low attack complexity, no user interaction, and partial impact on confidentiality, integrity, and availability. The flaw was publicly disclosed and patched in Fleet version 4.81.0. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to organizations relying on Fleet for device management, as it could lead to unauthorized data access and configuration tampering.

Potential Impact

The impact of CVE-2026-34386 is substantial for organizations using Fleet versions prior to 4.81.0. Successful exploitation allows attackers with Team Admin or Global Admin privileges to compromise the confidentiality of sensitive data stored in the Fleet database, including potentially sensitive device and user information. Integrity is affected as attackers can modify team configurations arbitrarily, potentially disrupting device management policies and operational workflows. Availability could be indirectly impacted if malicious configuration injections cause system instability or denial of service. Since Fleet is often used to manage large fleets of devices in enterprises, government agencies, and managed service providers, exploitation could lead to widespread operational disruption and data breaches. The requirement for authenticated admin-level access limits the attack surface but insider threats or compromised admin credentials could be leveraged. The vulnerability also raises concerns about lateral movement and privilege escalation within organizations using Fleet as a central management tool.

Mitigation Recommendations

To mitigate CVE-2026-34386, organizations should immediately upgrade Fleet to version 4.81.0 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict access controls and audit logging around Team Admin and Global Admin roles to detect and prevent misuse. Implement multi-factor authentication (MFA) for all admin accounts to reduce the risk of credential compromise. Regularly review and limit the number of users with elevated privileges to minimize attack surface. Conduct thorough API usage monitoring to detect anomalous or unauthorized API calls that could indicate exploitation attempts. Additionally, perform regular security assessments and code reviews of custom Fleet configurations and integrations to ensure no injection vectors remain. Network segmentation and least privilege principles should be applied to restrict access to Fleet management interfaces. Finally, maintain up-to-date backups of Fleet configurations and databases to enable rapid recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T13:45:29.619Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6d01e3c064ed76fe28e1f

Added to database: 3/27/2026, 6:44:46 PM

Last enriched: 3/27/2026, 7:00:28 PM

Last updated: 3/27/2026, 7:57:43 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses