InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e.g. `/api/part/`, `/api/stock/`, `/api/order/so/allocation/`, and others) accept a filters parameter that is passed directly to Django's ORM queryset.filter(**filters) without any field allowlisting. This enables any authenticated user to traverse model relationships using Django's __ lookup syntax and perform blind boolean-based data extraction. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/inventree/InvenTree/pull/11581 | Issue Tracking Patch |
| https://github.com/inventree/InvenTree/security/advisories/GHSA-m8j2-vfmq-p6qg | Vendor Advisory |
Configurations
History
01 Apr 2026, 18:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Inventree Project
Inventree Project inventree |
|
| CPE | cpe:2.3:a:inventree_project:inventree:*:*:*:*:*:*:*:* | |
| References | () https://github.com/inventree/InvenTree/pull/11581 - Issue Tracking, Patch | |
| References | () https://github.com/inventree/InvenTree/security/advisories/GHSA-m8j2-vfmq-p6qg - Vendor Advisory |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 20:16
Updated : 2026-04-01 18:48
NVD link : CVE-2026-33530
Mitre link : CVE-2026-33530
CVE.ORG link : CVE-2026-33530
JSON object : View
Products Affected
inventree_project
- inventree
CWE
CWE-202
Exposure of Sensitive Information Through Data Queries
