Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.5
InvenTree Inventory Management System: Malicious Template Injection
CVE-2026-35477
Summary
An attacker with staff permissions can craft a malicious template that executes arbitrary code when rendered. Affected are InvenTree versions 1.2.3 to 1.2.6. Update to 1.2.7 or 1.3.0 to fix this issue.
Original title
InvenTree is an Open Source Inventory Management System. From 1.2.3 to 1.2.6, the fix for CVE-2026-27629 upgraded the PART_NAME_FORMAT validator to use jinja2.sandbox.SandboxedEnvironment. However,...
Original description
InvenTree is an Open Source Inventory Management System. From 1.2.3 to 1.2.6, the fix for CVE-2026-27629 upgraded the PART_NAME_FORMAT validator to use jinja2.sandbox.SandboxedEnvironment. However, the actual renderer in part/helpers.py was not updated and still uses the non-sandboxed jinja2.Environment. Additionally, the validator uses a dummy Part instance with pk=None, which allows conditional template expressions to behave differently during validation versus production rendering. A staff user with settings access can craft a template that passes validation but executes arbitrary code during rendering. This issue requires access by a user with granted staff permissions. This vulnerability is fixed in 1.2.7 and 1.3.0.
nvd CVSS3.1
5.5
Vulnerability type
CWE-1336
Published: 8 Apr 2026 · Updated: 8 Apr 2026 · First seen: 8 Apr 2026