Description
InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, when INVENTREE_DOWNLOAD_FROM_URL is enabled (opt-in), authenticated users can supply remote_image URLs that are fetched server-side via requests.get() with only Django's URLValidator check. There is no validation against private IP ranges or internal hostnames. Redirects are followed (allow_redirects=True), enabling bypass of any URL-format checks. This vulnerability is fixed in 1.2.7 and 1.3.0.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery exposing internal resources
Action: Immediate Patch
AI Analysis

Impact

InvenTree permits authenticated users to upload images by specifying a remote_image URL. The URLs are retrieved server‑side with requests.get() using only Django’s URLValidator, which does not validate against private IP ranges or internal hostnames. Redirects are automatically followed, allowing an attacker to point the download to an internal resource or a private IP address. The result is a classic SSRF where the InvenTree server can be coerced into making arbitrary HTTP requests, exposing internal data or enabling further network reconnaissance.

Affected Systems

The vulnerability affects the InvenTree inventory management application. All versions prior to 1.2.7 and 1.3.0 are impacted when the INVENTREE_DOWNLOAD_FROM_URL feature is enabled. Users running earlier releases should update to the patched versions to eliminate the flaw.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate security impact. The EPSS score is not provided, and the flaw is not listed in the CISA KEV catalog, implying it has not been widely exploited. The attack requires an authenticated user with the download feature enabled, but does not require advanced access. Once authenticated, an attacker can supply a malicious remote_image URL and force the InvenTree server to resolve private or internal addresses, potentially leaking sensitive information or facilitating additional attacks.

Generated by OpenCVE AI on April 8, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade InvenTree to version 1.2.7 or 1.3.0 as soon as possible.
  • If an upgrade cannot be performed immediately, disable the INVENTREE_DOWNLOAD_FROM_URL setting to block remote image fetching.
  • Restrict outbound traffic from the InvenTree server to trusted domains or block internal IP ranges using a firewall.
  • Monitor application logs for suspicious remote_image requests and verify that no internal resources are being accessed.

Generated by OpenCVE AI on April 8, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Inventree
Inventree inventree
Vendors & Products Inventree
Inventree inventree

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, when INVENTREE_DOWNLOAD_FROM_URL is enabled (opt-in), authenticated users can supply remote_image URLs that are fetched server-side via requests.get() with only Django's URLValidator check. There is no validation against private IP ranges or internal hostnames. Redirects are followed (allow_redirects=True), enabling bypass of any URL-format checks. This vulnerability is fixed in 1.2.7 and 1.3.0.
Title InvenTree has SSRF via Remote Image Download — No IP/Hostname Validation on remote_image URLs
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Inventree Inventree
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T19:32:46.744Z

Reserved: 2026-04-06T21:29:17.349Z

Link: CVE-2026-39362

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T20:16:25.077

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-39362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:38Z

Weaknesses