CVE-2026-25963
Broken Authorization in Fleet Certificate Template Deletion API
Publication date: 2026-02-26
Last updated on: 2026-02-27
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fleetdm | fleet | to 4.80.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-25963 is an authorization bypass vulnerability in Fleet's certificate template batch deletion API affecting versions prior to 4.80.1."}, {'type': 'paragraph', 'content': 'Fleet supports certificate templates scoped to individual teams, but the batch deletion endpoint only validates authorization based on a user-supplied team identifier without verifying that the certificate templates being deleted actually belong to that team.'}, {'type': 'paragraph', 'content': 'As a result, a team administrator can delete certificate templates belonging to other teams within the same Fleet instance.'}] [1]
How can this vulnerability impact me? :
This vulnerability can disrupt certificate-based workflows such as device enrollment, Wi-Fi authentication, VPN access, or other configurations that depend on certificates for the affected teams.
The impact is limited to the integrity and availability of certificate templates across teams.
It does not allow privilege escalation, access to sensitive data, or compromise Fleet’s control plane.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, administrators should restrict access to certificate template management to trusted users.
Avoid delegating team administrator permissions where not strictly required.
Upgrading Fleet to version 4.80.1 or later will patch the issue.