πŸ” CVE Alert

CVE-2026-24000

UNKNOWN 0.0

Fleet has a rate limiting bypass via untrusted client IP headers

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Fleet is open source device management software. Prior to version 4.80.1, Fleet trusted client-supplied IP address headers when determining the source IP for incoming requests. This allowed authenticated and unauthenticated clients to spoof their apparent IP address and bypass per-IP rate limiting controls. Fleet determines a client’s public IP address using HTTP headers such as X-Forwarded-For, X-Real-IP, and/or True-Client-IP. These headers were trusted without validation. An attacker could supply arbitrary values in these headers, causing Fleet to treat each request as originating from a different IP address. This could allow an attacker to bypass per-IP rate limits and increase the effectiveness of brute-force or password-spraying attempts against authentication endpoints. This issue does not allow authentication bypass, privilege escalation, data exposure, or remote code execution on its own. Version 4.80.1 contains a patch. As a workaround, run Fleet behind a trusted reverse proxy or load balancer that overwrites client IP headers.

CWE CWE-290
Vendor fleetdm
Product fleet
Published May 14, 2026
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for fleetdm fleet

Be the first to know when new unknown vulnerabilities affecting fleetdm fleet are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

fleetdm / fleet
< 4.80.1

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/fleetdm/fleet/security/advisories/GHSA-j8h8-75h3-jg53 github.com: https://github.com/fleetdm/fleet/releases/tag/fleet-v4.80.1