Description
InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, any users who have staff access permissions can install plugins via the API, without requiring "superuser" account access. This level of permission requirement is out of alignment with other plugin actions (such as uninstalling) which do require superuser access. The vulnerability allows staff users (who may be considered to have a lower level of trust than a superuser account) to install arbitrary (and potentially harmful) plugins. This vulnerability is fixed in 1.2.7 and 1.3.0.
Published: 2026-04-08
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Plugin Installation for staff users
Action: Patch Immediately
AI Analysis

Impact

The vulnerability allows users with staff-level permissions in InvenTree to install plugins through the API without requiring superuser rights. This deviation from the expected privilege model permits the deployment of arbitrary or malicious plugins, potentially enabling an attacker to execute arbitrary code, modify inventory data, or disrupt operations. The weakness is categorized as CWE‑285, Abuse of Privilege. If exploited, the attacker can gain administrative influence over the system’s plugins, leading to confidentiality, integrity, and availability impacts.

Affected Systems

Any InvenTree installation running a version earlier than 1.2.7 for the 1.2 series or earlier than 1.3.0 for the 1.3 series is vulnerable. The issue is specific to the InvenTree product. Users should verify the deployed version and ensure they are running a patched release.

Risk and Exploitability

The CVSS score of 6.6 indicates moderate severity. No EPSS score is available, and the flaw is not listed in CISA’s KEV catalog, suggesting limited evidence of recent exploitation. The attack likely proceeds via an authenticated API call made by a staff user; no external network escalation is required beyond the existing staff credentials. The exploitability is therefore contingent on staff accounts having active API access, which many installations provide for routine operations.

Generated by OpenCVE AI on April 8, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade InvenTree to version 1.2.7 or 1.3.0 to apply the vendor fix
  • Confirm that only superusers retain the ability to install plugins via the API
  • Review the source and integrity of all installed plugins and remove any untrusted additions
  • Consider tightening API access controls to restrict plugin installation to privileged accounts
  • Implement monitoring for anomalous plugin installation activity by staff users

Generated by OpenCVE AI on April 8, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Inventree
Inventree inventree
Vendors & Products Inventree
Inventree inventree

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, any users who have staff access permissions can install plugins via the API, without requiring "superuser" account access. This level of permission requirement is out of alignment with other plugin actions (such as uninstalling) which do require superuser access. The vulnerability allows staff users (who may be considered to have a lower level of trust than a superuser account) to install arbitrary (and potentially harmful) plugins. This vulnerability is fixed in 1.2.7 and 1.3.0.
Title InvenTree Plugin Installation - Insufficient Permissions
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}


Subscriptions

Inventree Inventree
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T14:16:36.423Z

Reserved: 2026-04-02T20:49:44.453Z

Link: CVE-2026-35479

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T20:16:24.770

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-35479

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:40Z

Weaknesses