Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.1
Fleet: Low-Privilege Users Can See Google Calendar Passwords
CVE-2026-27465
GHSA-2v6m-6xw3-6467
GHSA-2v6m-6xw3-6467
Summary
Fleet returns sensitive Google Calendar login information to users with limited access. This could allow unauthorized access to Google Calendar data or other Google resources. To fix this, update to version 4.80.1 or remove the Google Calendar integration and change the associated password.
What to do
- Update github.com fleetdm to version 4.80.1.
- Update fleetdm github.com/fleetdm/fleet/v4 to version 4.80.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | fleetdm | <= 4.80.1 | 4.80.1 |
| fleetdm | fleet | <= 4.80.1 | – |
| fleetdm | github.com/fleetdm/fleet/v4 | <= 4.80.1 | 4.80.1 |
Original title
Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users
Original description
### Summary
A vulnerability in Fleet’s configuration API could expose Google Calendar service account credentials to authenticated users with low-privilege roles. This may allow unauthorized access to Google Calendar resources associated with the service account.
### Impact
Fleet returns configuration data through an API endpoint that is accessible to authenticated users, including those with the lowest-privilege “Observer” role. In affected versions, Google Calendar service account credentials were not properly obfuscated before being returned.
As a result, a low-privilege user could retrieve the service account’s private key material. Depending on how the Google Calendar integration is configured, this could allow unauthorized access to calendar data or other Google Workspace resources associated with the service account.
This issue does not allow escalation of privileges within Fleet or access to device management functionality.
### Patches
- v4.80.1
### Workarounds
If an immediate upgrade is not possible, administrators should remove the Google Calendar integration from Fleet and rotate the affected Google service account credentials.
### For more information
If there are any questions or comments about this advisory:
Email Fleet at [[email protected]](mailto:[email protected])
Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
### Credits
Fleet thanks @secfox-ai for responsibly reporting this issue.
A vulnerability in Fleet’s configuration API could expose Google Calendar service account credentials to authenticated users with low-privilege roles. This may allow unauthorized access to Google Calendar resources associated with the service account.
### Impact
Fleet returns configuration data through an API endpoint that is accessible to authenticated users, including those with the lowest-privilege “Observer” role. In affected versions, Google Calendar service account credentials were not properly obfuscated before being returned.
As a result, a low-privilege user could retrieve the service account’s private key material. Depending on how the Google Calendar integration is configured, this could allow unauthorized access to calendar data or other Google Workspace resources associated with the service account.
This issue does not allow escalation of privileges within Fleet or access to device management functionality.
### Patches
- v4.80.1
### Workarounds
If an immediate upgrade is not possible, administrators should remove the Google Calendar integration from Fleet and rotate the affected Google service account credentials.
### For more information
If there are any questions or comments about this advisory:
Email Fleet at [[email protected]](mailto:[email protected])
Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
### Credits
Fleet thanks @secfox-ai for responsibly reporting this issue.
nvd CVSS3.1
6.5
nvd CVSS4.0
1.3
Vulnerability type
CWE-201
CWE-200
Information Exposure
- https://nvd.nist.gov/vuln/detail/CVE-2026-27465
- https://github.com/fleetdm/fleet/commit/23fc6804efe785f806f769d6be1f5f05b2e13ec2
- https://github.com/advisories/GHSA-2v6m-6xw3-6467
- https://github.com/fleetdm/fleet/security/advisories/GHSA-2v6m-6xw3-6467 Vendor Advisory
- https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27465... Vendor Advisory
- https://github.com/fleetdm/fleet Product
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026