Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inventree Project
Inventree Project inventree |
|
| CPEs | cpe:2.3:a:inventree_project:inventree:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Inventree Project
Inventree Project inventree |
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inventree
Inventree inventree |
|
| Vendors & Products |
Inventree
Inventree inventree |
Wed, 08 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1.2.7, any authenticated InvenTree user can create a valid API token attributed to any other user in the system — including administrators and superusers — by supplying the target's user ID in the user field of a POST /api/user/tokens/ request. The returned token is immediately usable for full API authentication as the target user, from any network location, with no further interaction required. This vulnerability is fixed in 1.2.7 and 1.3.0. | |
| Title | InvenTree has Arbitrary API Token Creation | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T20:12:15.181Z
Reserved: 2026-04-02T20:49:44.453Z
Link: CVE-2026-35478
Updated: 2026-04-08T20:12:05.710Z
Status : Analyzed
Published: 2026-04-08T20:16:24.630
Modified: 2026-04-20T15:12:03.863
Link: CVE-2026-35478
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:27:42Z