Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.0

Fleet: Unauthorized Certificate Template Deletion by Team Administrators

CVE-2026-25963 GHSA-5jvp-m9h4-253h GHSA-5jvp-m9h4-253h
Summary

A security issue in Fleet allows team administrators to delete certificate templates belonging to other teams. This could disrupt certificate-based workflows like device enrollment, Wi-Fi access, and VPN connections for affected teams. To protect your setup, update to version 4.80.1 or restrict access to certificate template management to trusted users.

What to do
  • Update github.com fleetdm to version 4.80.1.
  • Update fleetdm github.com/fleetdm/fleet/v4 to version 4.80.1.
Affected software
VendorProductAffected versionsFix available
github.com fleetdm <= 4.80.1 4.80.1
fleetdm fleet <= 4.80.1
fleetdm github.com/fleetdm/fleet/v4 <= 4.80.1 4.80.1
Original title
Fleet: Authorization Bypass in certificate template batch deletion for team administrators
Original description
### Summary

A broken authorization check in Fleet’s certificate template deletion API could allow a team administrator to delete certificate templates belonging to other teams within the same Fleet instance.

### Impact

Fleet supports certificate templates that are scoped to individual teams. In affected versions, the batch deletion endpoint validated authorization using a user-supplied team identifier but did not verify that the certificate template IDs being deleted actually belonged to that team.

As a result, a team administrator could delete certificate templates associated with other teams, potentially disrupting certificate-based workflows such as device enrollment, Wi-Fi authentication, VPN access, or other certificate-dependent configurations for the affected teams.

This issue does not allow privilege escalation, access to sensitive data, or compromise of Fleet’s control plane. Impact is limited to integrity and availability of certificate templates across teams.

### Patches

- v4.80.1

### Workarounds

If an immediate upgrade is not possible, administrators should restrict access to certificate template management to trusted users and avoid delegating team administrator permissions where not strictly required.

### For more information

If there are any questions or comments about this advisory:

Email Fleet at [[email protected]](mailto:[email protected])
Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)

### Credits

Fleet thanks @secfox-ai for responsibly reporting this issue.
nvd CVSS3.1 6.5
nvd CVSS4.0 1.2
Vulnerability type
CWE-863 Incorrect Authorization
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026