CVE-2026-26186
Received Received - Intake
SQL Injection in Fleet Device Management via order_key Parameter

Publication date: 2026-02-26

Last updated on: 2026-03-02

Assigner: GitHub, Inc.

Description
Fleet is open source device management software. A SQL injection vulnerability in versions prior to 4.80.1 allowed authenticated users to inject arbitrary SQL expressions via the `order_key` query parameter. Due to unsafe use of `goqu.I()` when constructing the `ORDER BY` clause, specially crafted input could escape identifier quoting and be interpreted as executable SQL. An authenticated attacker with access to the affected endpoint could inject SQL expressions into the underlying MySQL query. Although the injection occurs in an `ORDER BY` context, it is sufficient to enable blind SQL injection techniques that can disclose database information through conditional expressions that affect result ordering. Crafted expressions may also cause excessive computation or query failures, potentially leading to degraded performance or denial of service. No direct evidence of reliable data modification or stacked query execution was demonstrated. Version 4.80.1 fixes the issue. If an immediate upgrade is not possible, users should restrict access to the affected endpoint to trusted roles only and ensure that any user-supplied sort or column parameters are strictly allow-listed at the application or proxy layer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-26
Last Modified
2026-03-02
Generated
2026-05-07
AI Q&A
2026-02-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fleetdm fleet to 4.80.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-26186 is a SQL injection vulnerability in the Fleet open source device management software versions prior to 4.80.1. It occurs because the software unsafely uses the goqu.I() function when constructing the SQL ORDER BY clause, specifically with the order_key query parameter. This unsafe use allows an authenticated user to inject arbitrary SQL expressions that can escape identifier quoting and be executed as part of the SQL query.

Although the injection happens in an ORDER BY context, it enables blind SQL injection techniques that can leak database information by influencing the order of query results through conditional expressions. Crafted inputs may also cause excessive computation or query failures.


How can this vulnerability impact me? :

An attacker who is authenticated and has access to the affected endpoint can exploit this vulnerability to inject SQL code into the database queries. This can lead to disclosure of sensitive database information through blind SQL injection techniques.

Additionally, maliciously crafted inputs may cause excessive computation or query failures, which can degrade system performance or cause denial of service. However, there is no direct evidence that this vulnerability allows reliable data modification or execution of stacked queries.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, upgrade Fleet software to version 4.80.1 or later where the issue is fixed.

If an immediate upgrade is not possible, restrict access to the affected endpoint to trusted roles only.

Ensure that any user-supplied sort or column parameters are strictly allow-listed at the application or proxy layer to prevent injection.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart