Skip to content

OS command injection via crafted software package metadata in uninstall scripts

High
lukeheath published GHSA-7rhw-5mpv-gp4h Mar 27, 2026

Package

gomod github.com/fleetdm/fleet (Go)

Affected versions

< 4.81.1

Patched versions

>= 4.81.1

Description

Summary

A command injection vulnerability in Fleet's software installer pipeline allows an attacker to achieve arbitrary code execution as root (macOS/Linux) or SYSTEM (Windows) on managed hosts when an uninstall is triggered for a crafted software package.

Impact

When a software package is uploaded to Fleet, metadata such as package identifiers and product names is extracted from the binary and interpolated into auto-generated uninstall shell scripts without sanitization. An attacker who can convince a Fleet administrator to upload a crafted package (for example, through a supply-chain attack, typosquatted download, or compromised software mirror) can embed a malicious payload in the package metadata that executes when the uninstall script runs on managed endpoints.

The attacker does not need Fleet credentials. The Fleet administrator uploading the package is the target, not the threat actor.

Workarounds

Administrators should only upload software packages obtained from trusted, verified sources. Review package metadata (not just install/uninstall scripts) before uploading. If an immediate upgrade is not possible, manually inspect and edit auto-generated uninstall scripts before deployment.

For more information

If you have any questions or comments about this advisory:

Email us at security@fleetdm.com
Join #fleet in osquery Slack

Credits

We thank @secfox-ai for responsibly reporting this issue.

Severity

High

CVE ID

CVE-2026-34387

Weaknesses

No CWEs

Credits