Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3458-r943-hmx4 | Fleet: Password reset tokens remain valid after password change for 24 hours |
Tue, 31 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fleetdm
Fleetdm fleet |
|
| Vendors & Products |
Fleetdm
Fleetdm fleet |
Sat, 28 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale password reset token could be reused to reset the account password even after a defensive password change. Version 4.81.0 patches the issue. | |
| Title | Fleet: Password reset tokens remain valid after password change for 24 hours | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T19:32:38.862Z
Reserved: 2026-02-10T18:01:31.899Z
Link: CVE-2026-26060
Updated: 2026-03-27T19:32:33.220Z
Status : Analyzed
Published: 2026-03-27T19:16:42.240
Modified: 2026-03-31T16:23:48.100
Link: CVE-2026-26060
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:00:53Z
Github GHSA