A SQL Injection vulnerability in Fleet's MDM bootstrap package configuration allows an authenticated user with Team Admin or Global Admin privileges to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject arbitrary content into team configs via direct API calls.
An authenticated user with Team Admin or Global Admin role can exploit a flaw in how user-supplied input is handled during MDM bootstrap package configuration. Insufficient server-side input validation allows crafted input to manipulate database queries in unintended ways.
Successful exploitation could enable cross-team data corruption, exfiltration of sensitive information such as password hashes and API tokens, and potential privilege escalation. Exploitation requires authentication with team or global admin privileges and MDM to be enabled.
This issue does not affect instances where Apple MDM is disabled.
If an immediate upgrade is not possible, affected Fleet users should temporarily disable Apple MDM or limit admin roles.
If there are any questions or comments about this advisory:
Send an email to security@fleetdm.com
Join #fleet in osquery Slack
Fleet thanks the Secfox Research Team (@secfox-ai) for responsibly reporting this issue.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-89"
],
"nvd_published_at": "2026-03-27T19:16:43Z",
"github_reviewed_at": "2026-03-30T19:18:29Z",
"severity": "MODERATE"
}