🔐 CVE Alert

CVE-2026-27465

UNKNOWN 0.0

Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Fleet is open source device management software. In versions prior to 4.80.1, a vulnerability in Fleet’s configuration API could expose Google Calendar service account credentials to authenticated users with low-privilege roles. This may allow unauthorized access to Google Calendar resources associated with the service account. Fleet returns configuration data through an API endpoint that is accessible to authenticated users, including those with the lowest-privilege “Observer” role. In affected versions, Google Calendar service account credentials were not properly obfuscated before being returned. As a result, a low-privilege user could retrieve the service account’s private key material. Depending on how the Google Calendar integration is configured, this could allow unauthorized access to calendar data or other Google Workspace resources associated with the service account. This issue does not allow escalation of privileges within Fleet or access to device management functionality. Version 4.80.1 patches the issue. If an immediate upgrade is not possible, administrators should remove the Google Calendar integration from Fleet and rotate the affected Google service account credentials.

CWE CWE-201
Vendor fleetdm
Product fleet
Published Feb 26, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for fleetdm fleet

Be the first to know when new unknown vulnerabilities affecting fleetdm fleet are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

fleetdm / fleet
< 4.80.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/fleetdm/fleet/security/advisories/GHSA-2v6m-6xw3-6467