| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2v6m-6xw3-6467 | Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fleetdm
Fleetdm fleet |
|
| Vendors & Products |
Fleetdm
Fleetdm fleet |
Thu, 26 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fleet is open source device management software. In versions prior to 4.80.1, a vulnerability in Fleet’s configuration API could expose Google Calendar service account credentials to authenticated users with low-privilege roles. This may allow unauthorized access to Google Calendar resources associated with the service account. Fleet returns configuration data through an API endpoint that is accessible to authenticated users, including those with the lowest-privilege “Observer” role. In affected versions, Google Calendar service account credentials were not properly obfuscated before being returned. As a result, a low-privilege user could retrieve the service account’s private key material. Depending on how the Google Calendar integration is configured, this could allow unauthorized access to calendar data or other Google Workspace resources associated with the service account. This issue does not allow escalation of privileges within Fleet or access to device management functionality. Version 4.80.1 patches the issue. If an immediate upgrade is not possible, administrators should remove the Google Calendar integration from Fleet and rotate the affected Google service account credentials. | |
| Title | Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users | |
| Weaknesses | CWE-201 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T14:26:24.835Z
Reserved: 2026-02-19T17:25:31.101Z
Link: CVE-2026-27465
Updated: 2026-02-26T14:26:19.011Z
Status : Undergoing Analysis
Published: 2026-02-26T03:16:04.520
Modified: 2026-02-27T14:06:59.787
Link: CVE-2026-27465
No data.
OpenCVE Enrichment
Updated: 2026-02-26T13:09:42Z
Github GHSA