{"id":"CVE-2025-49000","summary":"InvenTree has uncontrolled memory allocation via built-in label-sheet plugin","details":"InvenTree is an Open Source Inventory Management System. Prior to version 0.17.13, the skip field in the built-in `label-sheet` plugin lacks an upper bound, so a large value forces the server to allocate an enormous Python list. This lets any authenticated label-printing user trigger a denial-of-service via memory exhaustion. the issue is fixed in versions 0.17.13 and higher. No workaround is available aside from upgrading to the patched version.","aliases":["GHSA-m2ch-h84r-p9r6"],"modified":"2026-04-10T05:28:56.208315Z","published":"2025-06-03T20:54:27.744Z","database_specific":{"cwe_ids":["CWE-400","CWE-770"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/49xxx/CVE-2025-49000.json"},"references":[{"type":"WEB","url":"https://github.com/inventree/InvenTree/releases/tag/0.17.13"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/49xxx/CVE-2025-49000.json"},{"type":"ADVISORY","url":"https://github.com/inventree/InvenTree/security/advisories/GHSA-m2ch-h84r-p9r6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-49000"},{"type":"FIX","url":"https://github.com/inventree/InvenTree/commit/0826a75ef6dde0ad96d680f52a9cf171ba2ce98b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/inventree/inventree","events":[{"introduced":"0"},{"fixed":"2a7f5f94c8dc1d05b417e654225d4da75f7791bd"}]}],"versions":["0.0.10","0.0.11","0.0.12","0.0.3","0.0.6","0.0.8","0.0.9","0.1.0","0.1.1","0.1.2","0.1.4","0.1.5","0.1.6","0.1.7","0.1.8","0.10.0","0.11.0","0.12.0","0.13.0","0.17.0","0.17.1","0.17.10","0.17.11","0.17.12","0.17.2","0.17.3","0.17.4","0.17.5","0.17.6","0.17.7","0.17.8","0.17.9","0.2.0","0.2.1","0.2.2","0.2.3","0.2.4","0.3.0","0.4.0","0.8.0","0.9.0","v0.0.11","v0.0.5","v0.0.7","v0.1.3","v0.7.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-49000.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}]}