Skip to content
Threat Feed
high advisory

InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)

A non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.

CVE-2026-35476 is a privilege escalation vulnerability affecting InvenTree, an open-source inventory management system. The vulnerability resides in versions prior to 1.2.7 and 1.3.0. It allows a non-staff authenticated user to elevate their account privileges to a staff level. This is achieved by sending a specially crafted POST request to the user’s account endpoint. The root cause is due to improperly configured write permissions on the API endpoint, enabling unauthorized modification of the user’s staff status. Upgrading to versions 1.2.7 or 1.3.0 resolves this issue. This vulnerability allows attackers to gain elevated privileges within the InvenTree system, potentially leading to unauthorized data access, modification, or other malicious activities.

Attack Chain

  1. An attacker registers a standard user account on the InvenTree platform.
  2. The attacker authenticates to obtain a valid session token or API key.
  3. The attacker crafts a POST request to the user account endpoint, typically /api/user/<user_id>/.
  4. The POST request includes a data payload modifying the is_staff field to true.
  5. The attacker sends the malicious POST request to the InvenTree server.
  6. Due to the improperly configured write permissions, the server accepts the request and updates the user’s is_staff status in the database.
  7. The attacker’s account is now elevated to staff level, granting access to administrative functions and data.

Impact

Successful exploitation of CVE-2026-35476 allows an attacker to escalate their privileges from a standard user to a staff user within the InvenTree system. This can lead to unauthorized access to sensitive inventory data, modification of system settings, creation of new administrator accounts, and potentially full control over the InvenTree instance. The number of affected systems depends on the adoption rate of vulnerable InvenTree versions.

Recommendation

  • Upgrade InvenTree installations to version 1.2.7 or 1.3.0 or later to patch CVE-2026-35476.
  • Deploy the Sigma rule InvenTree User Staff Status Modification via API to detect suspicious POST requests attempting to modify user staff status on the API endpoint.
  • Monitor InvenTree web server logs for POST requests to /api/user/ endpoints with the is_staff parameter, and investigate any unexpected activity.
  • Review InvenTree’s threat model and assumed trust configuration documentation (https://docs.inventree.org/en/stable/concepts/threat_model/#assumed-trust) to understand potential risks and hardening measures.

Detection coverage 2

InvenTree User Staff Status Modification via API

high

Detects POST requests to the InvenTree API that attempt to modify a user's staff status.

sigma tactics: privilege_escalation techniques: T1068 sources: webserver, linux

InvenTree Suspicious API POST Request

medium

Detects POST requests with is_staff=true to the InvenTree API server to identify potential exploit attempts.

sigma tactics: privilege_escalation techniques: T1068 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

TypeValue
email[email protected]