Home

Description

fleetdm/fleet is open source device management software. Prior to versions 4.78.2, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, if Windows MDM is enabled, an unauthenticated attacker can exploit this XSS vulnerability to steal a Fleet administrator's authentication token (FLEET::auth_token) from localStorage. This could allow unauthorized access to Fleet, including administrative access, visibility into device data, and modification of configuration. Versions 4.78.2, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-21 | Updated 2026-01-21 | Assigner GitHub_M




MEDIUM: 5.5CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 4.78.0, < 4.78.2
affected

>= 4.77.0, < 4.77.1
affected

>= 4.76.0, < 4.76.2
affected

< 4.53.3
affected

References

github.com/.../fleet/security/advisories/GHSA-gfpw-jgvr-cw4j

cve.org (CVE-2026-22808)

nvd.nist.gov (CVE-2026-22808)

Download JSON