Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 30 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inventree
Inventree inventree |
|
| Vendors & Products |
Inventree
Inventree inventree |
Thu, 26 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e.g. `/api/part/`, `/api/stock/`, `/api/order/so/allocation/`, and others) accept a filters parameter that is passed directly to Django's ORM queryset.filter(**filters) without any field allowlisting. This enables any authenticated user to traverse model relationships using Django's __ lookup syntax and perform blind boolean-based data extraction. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available. | |
| Title | InvenTree Vulnerable to ORM Filter Injection | |
| Weaknesses | CWE-202 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T11:24:37.542Z
Reserved: 2026-03-20T18:05:11.830Z
Link: CVE-2026-33530
Updated: 2026-03-30T11:24:33.767Z
Status : Awaiting Analysis
Published: 2026-03-26T20:16:15.237
Modified: 2026-03-30T13:26:50.827
Link: CVE-2026-33530
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:25:26Z