Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-30245 Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 03 Oct 2025 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tandoor:recipes:2.0.0:alpha1:*:*:*:*:*:*

Mon, 22 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tandoor
Tandoor recipes
Vendors & Products Tandoor
Tandoor recipes

Fri, 19 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Sep 2025 20:00:00 +0000

Type Values Removed Values Added
Description Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-19T20:17:08.121Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57396

cve-icon Vulnrichment

Updated: 2025-09-19T20:16:59.326Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-19T20:15:40.043

Modified: 2025-10-03T16:58:21.410

Link: CVE-2025-57396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-22T10:06:17Z