CVE-2026-39362
Server-Side Request Forgery in InvenTree Image Download Component
Publication date: 2026-04-08
Last updated on: 2026-04-21
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| inventree_project | inventree | to 1.2.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated users to perform Server-Side Request Forgery (SSRF) attacks, potentially accessing internal services and cloud metadata endpoints without authorization.
Such unauthorized access could lead to exposure of sensitive internal data or systems, which may impact compliance with standards and regulations like GDPR or HIPAA that require protection of sensitive information and internal resources.
However, the provided information does not explicitly describe the direct impact on compliance frameworks or specific regulatory requirements.
Can you explain this vulnerability to me?
CVE-2026-39362 is a Server-Side Request Forgery (SSRF) vulnerability in InvenTree versions up to 1.2.6. It occurs when the INVENTREE_DOWNLOAD_FROM_URL setting is enabled, allowing authenticated users to supply remote_image URLs that the server fetches using Python's requests.get() function with redirects allowed.
The URLs are only validated by Django's URLValidator, which checks the URL format but does not verify whether the destination IP address is private or internal. Because redirects are followed, attackers can bypass URL format checks by redirecting to internal IP addresses or hostnames.
This enables attackers to perform SSRF attacks by making the server request internal services or cloud metadata endpoints that should not be accessible externally.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with authenticated access to InvenTree to make the server perform unauthorized requests to internal network services or cloud metadata endpoints.
Such unauthorized access can lead to information disclosure, unauthorized internal service interaction, or potential further exploitation of internal systems that are normally protected from external access.
The impact is considered moderate in severity.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves server-side requests to URLs supplied by authenticated users when the INVENTREE_DOWNLOAD_FROM_URL setting is enabled. Detection can focus on monitoring outgoing HTTP requests from the InvenTree server, especially those targeting internal IP ranges or unusual destinations.
You can detect potential exploitation by inspecting logs or network traffic for requests made by the InvenTree server to private IP ranges such as 127.0.0.1, 10.x.x.x, or 172.16.x.x.
- Use network monitoring tools like tcpdump or Wireshark to capture outgoing HTTP requests from the server: tcpdump -i <interface> host 127.0.0.1 or net 10.0.0.0/8
- Check application logs for URLs fetched by the remote image download feature to identify requests to internal or unexpected IP addresses.
- Use command-line tools like curl or wget on the server to test if the INVENTREE_DOWNLOAD_FROM_URL feature is enabled and can fetch internal URLs.
What immediate steps should I take to mitigate this vulnerability?
The primary immediate mitigation is to disable the INVENTREE_DOWNLOAD_FROM_URL setting, which prevents the server from fetching remote images based on user-supplied URLs.
If disabling the feature is not possible, implement strict validation of the resolved IP addresses before making requests, including after following any redirects, to ensure requests are not made to private IP ranges or internal hostnames.
Upgrade InvenTree to version 1.2.7 or 1.3.0 or later, where this vulnerability has been fixed.