Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35477— InvenTree has SSTI in PART_NAME_FORMAT bypasses CVE-2026-27629 fix via {% if part.pk %} sandbox escape

CVSS 5.5 · Medium EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35477

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
InvenTree has SSTI in PART_NAME_FORMAT bypasses CVE-2026-27629 fix via {% if part.pk %} sandbox escape
Source: NVD (National Vulnerability Database)
Vulnerability Description
InvenTree is an Open Source Inventory Management System. From 1.2.3 to 1.2.6, the fix for CVE-2026-27629 upgraded the PART_NAME_FORMAT validator to use jinja2.sandbox.SandboxedEnvironment. However, the actual renderer in part/helpers.py was not updated and still uses the non-sandboxed jinja2.Environment. Additionally, the validator uses a dummy Part instance with pk=None, which allows conditional template expressions to behave differently during validation versus production rendering. A staff user with settings access can craft a template that passes validation but executes arbitrary code during rendering. This issue requires access by a user with granted staff permissions. This vulnerability is fixed in 1.2.7 and 1.3.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1336
Source: NVD (National Vulnerability Database)
Vulnerability Title
InvenTree 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
InvenTree是InvenTree开源的一个开源库存管理系统。提供强大的低级库存控制和零件跟踪。 InvenTree 1.2.3至1.2.6版本存在安全漏洞,该漏洞源于验证器与实际渲染器环境不匹配,且使用虚拟实例进行验证,可能导致具有员工权限的用户在渲染时执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
inventreeInvenTree >= 1.2.3, < 1.2.7 -

II. Public POCs for CVE-2026-35477

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-35477

登录查看更多情报信息。

Same Patch Batch · inventree · 2026-04-08 · 5 CVEs total

CVE-2026-354788.3 HIGHInvenTree has Arbitrary API Token Creation
CVE-2026-354767.2 HIGHInvenTree Affected by Privilege Escalation via API
CVE-2026-354796.6 MEDIUMInvenTree Plugin Installation - Insufficient Permissions
CVE-2026-39362InvenTree has SSRF via Remote Image Download — No IP/Hostname Validation on remote_image U

IV. Related Vulnerabilities

V. Comments for CVE-2026-35477

No comments yet


Leave a comment