GHSA-m2h6-4xpq-qw3m: A Fleet team maintainer can transfer hosts from any team via missing source team authorization
Summary
Fleet's host transfer API has a broken access control vulnerability (a flaw where permission checks don't work properly) that lets a team maintainer steal hosts from other teams by transferring them without authorization checks. Once stolen, the attacker can control the devices and run scripts with root privileges (the highest permission level), breaking team isolation in multi-tenant deployments (systems serving multiple separate organizations).
Solution / Mitigation
Upgrade to a patched version of Fleet. The source states: 'There is no workaround for this issue short of upgrading to a patched version.' As a precaution, organizations should audit host transfer activity in their Fleet logs for unexpected team reassignments.
Vulnerability Details
EPSS: 0.0%
Yes
March 27, 2026
Classification
Affected Vendors
Affected Packages
Original source: https://github.com/advisories/GHSA-m2h6-4xpq-qw3m
First tracked: March 28, 2026 at 02:00 AM
Classified by LLM (prompt v3) · confidence: 95%