InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, a path traversal vulnerability in the report template engine allows a staff-level user to read arbitrary files from the server filesystem via crafted template tags. Affected functions: `encode_svg_image()`, `asset()`, and `uploaded_image()` in `src/backend/InvenTree/report/templatetags/report.py`. This requires staff access (to upload / edit templates with maliciously crafted tags). If the InvenTree installation is configured with high access privileges on the host system, this path traversal may allow file access outside of the InvenTree source directory. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available.
PUBLISHED5.2CWE-89
InvenTree has Path Traversal In Report Templates
Problem type
Affected products
inventree
InvenTree
< 1.2.6 - AFFECTED
References
https://github.com/inventree/InvenTree/security/advisories/GHSA-rhc5-7c3r-c769
https://github.com/inventree/InvenTree/security/advisories/GHSA-rhc5-7c3r-c769
https://github.com/inventree/InvenTree/pull/11579
https://github.com/inventree/InvenTree/pull/11579
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-33531Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-33531",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"dateUpdated": "2026-03-26T19:40:50.787Z",
"dateReserved": "2026-03-20T18:05:11.830Z",
"datePublished": "2026-03-26T19:40:50.787Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2026-03-26T19:40:50.787Z"
},
"title": "InvenTree has Path Traversal In Report Templates",
"descriptions": [
{
"lang": "en",
"value": "InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, a path traversal vulnerability in the report template engine allows a staff-level user to read arbitrary files from the server filesystem via crafted template tags. Affected functions: `encode_svg_image()`, `asset()`, and `uploaded_image()` in `src/backend/InvenTree/report/templatetags/report.py`. This requires staff access (to upload / edit templates with maliciously crafted tags). If the InvenTree installation is configured with high access privileges on the host system, this path traversal may allow file access outside of the InvenTree source directory. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available."
}
],
"affected": [
{
"vendor": "inventree",
"product": "InvenTree",
"versions": [
{
"version": "< 1.2.6",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/inventree/InvenTree/security/advisories/GHSA-rhc5-7c3r-c769",
"name": "https://github.com/inventree/InvenTree/security/advisories/GHSA-rhc5-7c3r-c769",
"tags": [
"x_refsource_CONFIRM"
]
},
{
"url": "https://github.com/inventree/InvenTree/pull/11579",
"name": "https://github.com/inventree/InvenTree/pull/11579",
"tags": [
"x_refsource_MISC"
]
}
],
"metrics": [
{}
]
}
}
}