Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-26186

Fleet has an SQL Injection vulnerability via backtick escape in ORDER BY parameter
Back to all
CVE

CVE-2026-26186

Fleet has an SQL Injection vulnerability via backtick escape in ORDER BY parameter

Summary

A SQL Injection vulnerability in Fleet’s software versions API allowed authenticated users to inject arbitrary SQL expressions via the order_key query parameter. Due to unsafe use of goqu.I() when constructing the ORDER BY clause, specially crafted input could escape identifier quoting and be interpreted as executable SQL.

Impact

An authenticated attacker with access to the affected endpoint could inject SQL expressions into the underlying MySQL query. Although the injection occurs in an ORDER BY context, it is sufficient to enable blind SQL injection techniques that can disclose database information through conditional expressions that affect result ordering. Crafted expressions may also cause excessive computation or query failures, potentially leading to degraded performance or denial of service.

No direct evidence of reliable data modification or stacked query execution was demonstrated.

Workarounds

If an immediate upgrade is not possible, users should restrict access to the affected endpoint to trusted roles only and ensure that any user-supplied sort or column parameters are strictly allow-listed at the application or proxy layer.

For more information

If there are any questions or comments about this advisory:

Email fleet at security@fleetdm.com  

Join #fleet in osquery Slack

Credits

We thank @fuzzztf for responsibly reporting this issue.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
5.1
-
4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://github.com/fleetdm/fleet/security/advisories/GHSA-49xw-vfc4-7p43, https://nvd.nist.gov/vuln/detail/CVE-2026-26186, https://github.com/fleetdm/fleet, https://github.com/fleetdm/fleet/releases/tag/fleet-v4.80.1

Severity

8.8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.8
EPSS Probability
0.0006%
EPSS Percentile
0.18687%
Introduced Version
0
Fix Available
4.80.1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading