Home

Description

InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1.2.7, any authenticated InvenTree user can create a valid API token attributed to any other user in the system — including administrators and superusers — by supplying the target's user ID in the user field of a POST /api/user/tokens/ request. The returned token is immediately usable for full API authentication as the target user, from any network location, with no further interaction required. This vulnerability is fixed in 1.2.7 and 1.3.0.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-08 | Updated 2026-04-08 | Assigner GitHub_M




HIGH: 8.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

>= 0.16.0, < 1.2.7
affected

References

github.com/...enTree/security/advisories/GHSA-qh5j-c28q-c4rg

cve.org (CVE-2026-35478)

nvd.nist.gov (CVE-2026-35478)

Download JSON