CVE-2026-34389
Privilege Escalation via Email Validation Bypass in Fleet Device Management
Publication date: 2026-03-27
Last updated on: 2026-04-02
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fleetdm | fleet | to 4.81.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-34389 is a vulnerability in Fleet, an open source device management software, affecting versions prior to 4.81.0. The issue lies in the user invitation flow where the email address entered during invite acceptance is not verified against the originally invited email address.
This flaw allows an attacker who has a valid invite token to create an account using any arbitrary email address while inheriting the role and team memberships assigned by the invite, including potentially global admin privileges.
The vulnerability is fixed in version 4.81.0.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker with a valid invite token to create an account with elevated privileges, such as global admin, under any email address they choose.
This can lead to unauthorized access and control over the Fleet device management system, potentially allowing the attacker to manage devices, access sensitive information, or disrupt operations.
However, exploitation requires possession of a valid invite token, and no data exposure occurs without successful account creation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves misuse of valid invite tokens to create accounts with arbitrary email addresses and elevated privileges. Detection would focus on monitoring for suspicious account creations using invite tokens.
Specifically, you can look for new user accounts created with email addresses that do not match the originally invited email addresses or accounts that have unexpectedly elevated roles such as global admin.
Since the vulnerability requires possession of a valid invite token, monitoring access logs for invite token usage and correlating them with account creation events can help detect exploitation attempts.
No specific commands are provided in the available resources, but general approaches include:
- Query the Fleet user database or API to list recent account creations and verify if the email addresses match the invited emails.
- Audit logs for invite token usage and account creation timestamps.
- Check for accounts with elevated privileges created recently without corresponding invite email matches.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to upgrade Fleet to version 4.81.0 or later, where the vulnerability is fixed.
If immediate upgrading is not possible, recommended mitigations include:
- Treat invite links as sensitive credentials and avoid sharing them in public or semi-public communication channels.
- Revoke and reissue invites if there is suspicion that invite links have been exposed.
- Issue invites with the minimum necessary privileges and elevate roles only after account creation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Fleet allows an attacker with a valid invite token to create an account with an arbitrary email address and inherit elevated roles, including global admin privileges. This unauthorized privilege escalation could lead to improper access control and potential misuse of sensitive data.
Such unauthorized access and privilege escalation may impact compliance with standards and regulations like GDPR and HIPAA, which require strict access controls and protection of personal and sensitive information. If an attacker exploits this vulnerability, it could result in unauthorized data access or modification, thereby violating these regulatory requirements.
Mitigations include upgrading to version 4.81.0 or later, treating invite links as sensitive credentials, revoking and reissuing invites if exposure is suspected, and limiting privileges granted by invites to the minimum necessary.