Description

InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, a path traversal vulnerability in the report template engine allows a staff-level user to read arbitrary files from the server filesystem via crafted template tags. Affected functions: `encode_svg_image()`, `asset()`, and `uploaded_image()` in `src/backend/InvenTree/report/templatetags/report.py`. This requires staff access (to upload / edit templates with maliciously crafted tags). If the InvenTree installation is configured with high access privileges on the host system, this path traversal may allow file access outside of the InvenTree source directory. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available.

INFO

Published Date :

2026-03-26T19:40:50.787Z

Last Modified :

2026-03-27T19:47:03.887Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33531 vulnerability.

Vendors Products
Inventree
  • Inventree
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33531.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability