CVE-2026-35479
Received Received - Intake
Improper Access Control in InvenTree Plugin Installation Allows Privilege Escalation

Publication date: 2026-04-08

Last updated on: 2026-04-21

Assigner: GitHub, Inc.

Description
InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, any users who have staff access permissions can install plugins via the API, without requiring "superuser" account access. This level of permission requirement is out of alignment with other plugin actions (such as uninstalling) which do require superuser access. The vulnerability allows staff users (who may be considered to have a lower level of trust than a superuser account) to install arbitrary (and potentially harmful) plugins. This vulnerability is fixed in 1.2.7 and 1.3.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-21
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
inventree_project inventree to 1.2.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-35479 is a vulnerability in the InvenTree Open Source Inventory Management System affecting versions prior to 1.2.7 and 1.3.0. It allows users with staff-level access permissions to install plugins via the API without requiring superuser privileges. This is inconsistent with other plugin management actions, such as uninstalling plugins, which do require superuser access.

Because staff users are considered less trusted than superusers, this flaw violates the principle of least privilege by allowing potentially harmful or arbitrary plugins to be installed by staff users. The vulnerability was fixed by enforcing superuser access requirements for plugin installation in versions 1.2.7 and 1.3.0.


How can this vulnerability impact me? :

This vulnerability can allow staff users, who normally have limited trust, to install arbitrary plugins that may contain harmful code or functionality. Such plugins could potentially overwrite or delete server files, bypass security controls, or leak sensitive data.

Because plugins have full access to server files, the InvenTree database, and environment variables accessible to server and worker processes, malicious plugins could compromise the integrity, confidentiality, and availability of the system.

The vulnerability has a moderate severity with a CVSS v3.1 base score of 6.6, indicating a significant risk that can be exploited remotely with low complexity and no user interaction, but requiring staff-level privileges.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unauthorized plugin installation attempts by users with staff-level access, since the vulnerability allows such users to install plugins without superuser privileges.

Recommended detection measures include restricting InvenTree server access to trusted networks, using Web Application Firewalls (WAF), IP whitelisting, and monitoring authentication attempts for unusual activity such as brute force attacks.

While no specific commands are provided in the resources, administrators should monitor API calls related to plugin installation and audit logs for plugin installation events initiated by staff users.

Network-level detection can include inspecting traffic for API requests to plugin installation endpoints originating from staff accounts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading InvenTree to version 1.2.7 or later, where the vulnerability is fixed by enforcing superuser access requirements for plugin installation.

If upgrading is not immediately possible, administrators can disable plugin functionality entirely by setting the environment variable `PLUGINS_ENABLED` to false.

Alternatively, prevent runtime plugin installation by setting the environment variable `INVENTREE_PLUGIN_NOINSTALL` to true, which blocks plugin installation via the API.

Additionally, ensure that only trusted users have staff or superuser permissions, restrict server access to trusted networks, and apply network security controls such as WAF and IP whitelisting.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows staff users to install arbitrary plugins without superuser permissions, potentially introducing harmful code that could lead to unauthorized access, data leakage, or manipulation of sensitive information.

Such risks could impact compliance with standards and regulations like GDPR or HIPAA, which require strict controls over access to sensitive data and system integrity.

The CVE highlights the importance of strict network controls, trusted user and plugin management, and organizational security policies to mitigate risks inherent in InvenTree’s architecture and deployment.

Therefore, if exploited, this vulnerability could undermine compliance efforts by allowing lower-trust users to introduce potentially harmful plugins that might compromise confidentiality, integrity, or availability of data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart