Arbitrary Command Execution Vulnerability in Fleet Device Management Software
CVE-2026-26191

6MEDIUM

Key Information:

Vendor

Fleetdm

Status
Vendor
CVE Published:
14 May 2026

What is CVE-2026-26191?

Fleet is an open-source device management platform used for monitoring and managing endpoints. A vulnerability exists in Fleet's software installer pipeline prior to version 4.81.0, allowing an attacker to execute arbitrary commands as root on macOS/Linux or as SYSTEM on Windows during the uninstallation of a crafted software package. This issue arises from insufficient sanitization of metadata extracted from uploaded software packages. If a package contains malicious metadata, running the generated uninstall script could result in unintended command execution. To mitigate this issue, updating to version 4.81.0 or later is recommended. Alternatively, administrators should refrain from uploading unverified software packages and can manually review the automatically generated uninstall scripts.

Affected Version(s)

fleet < 4.81.1

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.