Skip to content

Sensitive Google Calendar credentials disclosed to low-privilege users

High
lukeheath published GHSA-2v6m-6xw3-6467 Feb 26, 2026

Package

gomod github.com/fleetdm/fleet (Go)

Affected versions

< 4.80.1

Patched versions

>= 4.80.1

Description

Summary

A vulnerability in Fleet’s configuration API could expose Google Calendar service account credentials to authenticated users with low-privilege roles. This may allow unauthorized access to Google Calendar resources associated with the service account.

Impact

Fleet returns configuration data through an API endpoint that is accessible to authenticated users, including those with the lowest-privilege “Observer” role. In affected versions, Google Calendar service account credentials were not properly obfuscated before being returned.

As a result, a low-privilege user could retrieve the service account’s private key material. Depending on how the Google Calendar integration is configured, this could allow unauthorized access to calendar data or other Google Workspace resources associated with the service account.

This issue does not allow escalation of privileges within Fleet or access to device management functionality.

Patches

  • v4.80.1

Workarounds

If an immediate upgrade is not possible, administrators should remove the Google Calendar integration from Fleet and rotate the affected Google service account credentials.

For more information

If you have any questions or comments about this advisory:

Email us at security@fleetdm.com
Join #fleet in osquery Slack

Credits

We thank @secfox-ai for responsibly reporting this issue.

Severity

High

CVE ID

CVE-2026-27465

Weaknesses

No CWEs

Credits