CVE-2026-25963
Received Received - Intake
Broken Authorization in Fleet Certificate Template Deletion API

Publication date: 2026-02-26

Last updated on: 2026-02-27

Assigner: GitHub, Inc.

Description
Fleet is open source device management software. In versions prior to 4.80.1, a broken authorization check in Fleet’s certificate template deletion API could allow a team administrator to delete certificate templates belonging to other teams within the same Fleet instance. Fleet supports certificate templates that are scoped to individual teams. In affected versions, the batch deletion endpoint validated authorization using a user-supplied team identifier but did not verify that the certificate template IDs being deleted actually belonged to that team. As a result, a team administrator could delete certificate templates associated with other teams, potentially disrupting certificate-based workflows such as device enrollment, Wi-Fi authentication, VPN access, or other certificate-dependent configurations for the affected teams. This issue does not allow privilege escalation, access to sensitive data, or compromise of Fleet’s control plane. Impact is limited to integrity and availability of certificate templates across teams. Version 4.80.1 patches the issue. If an immediate upgrade is not possible, administrators should restrict access to certificate template management to trusted users and avoid delegating team administrator permissions where not strictly required.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-26
Last Modified
2026-02-27
Generated
2026-05-07
AI Q&A
2026-02-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fleetdm fleet to 4.80.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-25963 is an authorization bypass vulnerability in Fleet's certificate template batch deletion API affecting versions prior to 4.80.1."}, {'type': 'paragraph', 'content': 'Fleet supports certificate templates scoped to individual teams, but the batch deletion endpoint only validates authorization based on a user-supplied team identifier without verifying that the certificate templates being deleted actually belong to that team.'}, {'type': 'paragraph', 'content': 'As a result, a team administrator can delete certificate templates belonging to other teams within the same Fleet instance.'}] [1]


How can this vulnerability impact me? :

This vulnerability can disrupt certificate-based workflows such as device enrollment, Wi-Fi authentication, VPN access, or other configurations that depend on certificates for the affected teams.

The impact is limited to the integrity and availability of certificate templates across teams.

It does not allow privilege escalation, access to sensitive data, or compromise Fleet’s control plane.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, administrators should restrict access to certificate template management to trusted users.

Avoid delegating team administrator permissions where not strictly required.

Upgrading Fleet to version 4.80.1 or later will patch the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart