Skip to content

SQL injection in MDM bootstrap package by authenticated team or global admin

High
lukeheath published GHSA-9p23-p2m4-2r4m Mar 27, 2026

Package

gomod github.com/fleetdm/fleet (Go)

Affected versions

< 4.81.0

Patched versions

>= 4.81.0

Description

Summary

A SQL injection vulnerability in Fleet's MDM bootstrap package configuration allows an authenticated user with Team Admin or Global Admin privileges to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject arbitrary content into team configs via direct API calls.

Impact

An authenticated user with Team Admin or Global Admin role can exploit a flaw in how user-supplied input is handled during MDM bootstrap package configuration. Insufficient server-side input validation allows crafted input to manipulate database queries in unintended ways.

Successful exploitation could enable cross-team data corruption, exfiltration of sensitive information such as password hashes and API tokens, and potential privilege escalation. Exploitation requires authentication with team or global admin privileges and MDM to be enabled.

This issue does not affect instances where Apple MDM is disabled.

Workarounds

If an immediate upgrade is not possible, affected Fleet users should temporarily disable Apple MDM or limit admin roles.

For more information

If you have any questions or comments about this advisory:

Email us at [security@fleetdm.com](mailto:security@fleetdm.com)

Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)

Credits

We thank the Secfox Research Team (@secfox-ai) for responsibly reporting this issue.

Severity

High

CVE ID

CVE-2026-34386

Weaknesses

No CWEs

Credits