PT-2026-3744 · Go · Github.Com/Fleetdm/Fleet+1
Published
2026-01-20
·
Updated
2026-01-20
CVSS v4.0
5.5
Medium
| AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H |
Summary
A cross-site scripting (XSS) vulnerability in Fleet’s Windows MDM authentication flow could allow an attacker to compromise a Fleet user account. In certain cases, this could lead to administrative access and the ability to perform privileged actions on managed devices.
Impact
If Windows MDM is enabled, an attacker could exploit a cross-site scripting (XSS) vulnerability by convincing an authenticated Fleet user to visit a malicious link. Successful exploitation could allow retrieval of the user’s Fleet authentication token from their browser.
A compromised authentication token may grant administrative access to the Fleet API, allowing an attacker to perform privileged actions such as deploying scripts to managed hosts.
This issue does not allow unauthenticated access and does not affect instances where Windows MDM is disabled.
Patches
- 4.78.2
- 4.77.1
- 4.76.2
- 4.75.2
- 4.53.3
Workarounds
If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.
For more information
If you have any questions or comments about this advisory:
Email us at security@fleetdm.com
Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
Credits
We thank @secfox-ai for responsibly reporting this issue.
Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Github.Com/Fleetdm/Fleet
Github.Com/Fleetdm/Fleet/V4