InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e.g. `/api/part/`, `/api/stock/`, `/api/order/so/allocation/`, and others) accept a filters parameter that is passed directly to Django's ORM queryset.filter(**filters) without any field allowlisting. This enables any authenticated user to traverse model relationships using Django's __ lookup syntax and perform blind boolean-based data extraction. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available.
PUBLISHED5.2CWE-202
InvenTree Vulnerable to ORM Filter Injection
Problem type
Affected products
inventree
InvenTree
< 1.2.6 - AFFECTED
References
https://github.com/inventree/InvenTree/security/advisories/GHSA-m8j2-vfmq-p6qg
https://github.com/inventree/InvenTree/security/advisories/GHSA-m8j2-vfmq-p6qg
https://github.com/inventree/InvenTree/pull/11581
https://github.com/inventree/InvenTree/pull/11581
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-33530Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-33530",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"dateUpdated": "2026-03-26T19:34:51.294Z",
"dateReserved": "2026-03-20T18:05:11.830Z",
"datePublished": "2026-03-26T19:34:51.294Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2026-03-26T19:34:51.294Z"
},
"title": "InvenTree Vulnerable to ORM Filter Injection",
"descriptions": [
{
"lang": "en",
"value": "InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e.g. `/api/part/`, `/api/stock/`, `/api/order/so/allocation/`, and others) accept a filters parameter that is passed directly to Django's ORM queryset.filter(**filters) without any field allowlisting. This enables any authenticated user to traverse model relationships using Django's __ lookup syntax and perform blind boolean-based data extraction. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available."
}
],
"affected": [
{
"vendor": "inventree",
"product": "InvenTree",
"versions": [
{
"version": "< 1.2.6",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-202: Exposure of Sensitive Information Through Data Queries",
"cweId": "CWE-202",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/inventree/InvenTree/security/advisories/GHSA-m8j2-vfmq-p6qg",
"name": "https://github.com/inventree/InvenTree/security/advisories/GHSA-m8j2-vfmq-p6qg",
"tags": [
"x_refsource_CONFIRM"
]
},
{
"url": "https://github.com/inventree/InvenTree/pull/11581",
"name": "https://github.com/inventree/InvenTree/pull/11581",
"tags": [
"x_refsource_MISC"
]
}
],
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
}
}
]
}
}
}