Description

InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e.g. `/api/part/`, `/api/stock/`, `/api/order/so/allocation/`, and others) accept a filters parameter that is passed directly to Django's ORM queryset.filter(**filters) without any field allowlisting. This enables any authenticated user to traverse model relationships using Django's __ lookup syntax and perform blind boolean-based data extraction. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available.

INFO

Published Date :

2026-03-26T19:34:51.294Z

Last Modified :

2026-03-26T19:34:51.294Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33530 vulnerability.

Vendors Products
Inventree
  • Inventree
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33530.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact