CVE-2026-23517
January 21, 2026
Fleet is open source device management software. A broken access control issue in versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 allowed authenticated users to access debug and profiling endpoints regardless of role. As a result, low-privilege users could view internal server diagnostics and trigger resource-intensive profiling operations. Fleet’s debug/pprof endpoints are accessible to any authenticated user regardless of role, including the lowest-privilege “Observer” role. This allows low-privilege users to access sensitive server internals, including runtime profiling data and in-memory application state, and to trigger CPU-intensive profiling operations that could lead to denial of service. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, users should put the debug/pprof endpoints behind an IP allowlist as a workaround.
Affected Packages
https://github.com/fleetdm/fleet.git (GITHUB):
Affected version(s) >=v0.0.4 <v4.53.3Fix Suggestion:
Update to version v4.53.3https://github.com/fleetdm/fleet.git (GITHUB):
Affected version(s) =v4.77.0 <v4.77.1Fix Suggestion:
Update to version v4.77.1https://github.com/fleetdm/fleet.git (GITHUB):
Affected version(s) >=v4.78.0 <v4.78.3Fix Suggestion:
Update to version v4.78.3https://github.com/fleetdm/fleet.git (GITHUB):
Affected version(s) =v4.76.0 <v4.76.2Fix Suggestion:
Update to version v4.76.2https://github.com/fleetdm/fleet.git (GITHUB):
Affected version(s) =v4.75.0 <v4.75.2Fix Suggestion:
Update to version v4.75.2github.com/fleetdm/fleet (GO):
Affected version(s) >=v4.78.0 <v4.78.3Fix Suggestion:
Update to version v4.78.3github.com/fleetdm/fleet (GO):
Affected version(s) =v4.77.0 <v4.77.1Fix Suggestion:
Update to version v4.77.1github.com/fleetdm/fleet (GO):
Affected version(s) =v4.75.0 <v4.75.2Fix Suggestion:
Update to version v4.75.2github.com/fleetdm/fleet (GO):
Affected version(s) =v4.76.0 <v4.76.2Fix Suggestion:
Update to version v4.76.2Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
UNREPORTED
CVSS v3
Base Score:
8.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
EPSS
Base Score:
0.04