Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Versions up to and including 2.5.3 set ALLOWED_HOSTS = '*' by default, which causes Django to accept any value in the HTTP Host header without validation. The application uses request.build_absolute_uri() to generate absolute URLs in multiple contexts, including invite link emails, API pagination, and OpenAPI schema generation. An attacker who can send requests to the application with a crafted Host header can manipulate all server-generated absolute URLs. The most critical impact is invite link poisoning: when an admin creates an invite and the application sends the invite email, the link points to the attacker's server instead of the real application. When the victim clicks the link, the invite token is sent to the attacker, who can then use it at the real application. As of time of publication, it is unknown if a patched version is available.
Published: 2026-03-26
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Invite Link Theft
Action: Apply Patch
AI Analysis

Impact

TandoorRecipes, a Django‑based recipe management platform, historically sets the ALLOWED_HOSTS setting to '*' by default in versions up to 2.5.3. This configuration causes the server to accept any value presented in the HTTP Host header without validation. When the application calls request.build_absolute_uri()—used for generating invite links, API pagination, and OpenAPI schemas—a malicious actor can send requests with a forged Host header and cause the application to generate absolute URLs that point to an attacker‐controlled domain. The most consequential consequence is invite link poisoning: an administrator’s invitation email contains a link that appears legitimate but redirects the recipient to the attacker’s site. When the victim follows the link, the invite token is exposed to the attacker, who can then use the token to log in to the real application as a privileged user. This attack is a classic example of Host Header Injection (CWE‑644) and leads to unauthorized access by stealing privileged tokens.

Affected Systems

The affected product is TandoorRecipes:recipes. All releases up to and including version 2.5.3 are vulnerable. No patched or fixed release has been reported at the time of this advisement. Users running any affected release should treat the system as insecure until an updated build is available.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.1, indicating high severity. The EPSS score is not published, and it is absent from the CISA KEV catalog, suggesting no widespread exploitation at the moment. However, because an attacker only needs the ability to send HTTP requests to the service, the attack requires remote network access rather than local privilege, making it potentially exploitable over the internet. The lack of any publicly available fix amplifies the risk, as targeted attackers can poison invites and compromise accounts with minimal effort.

Generated by OpenCVE AI on March 26, 2026 at 20:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the TandoorRecipes repository or official release channel for a newer version that removes the default '*' ALLOWED_HOSTS and apply the update if one is released.
  • If no update is available, edit the Django settings to replace ALLOWED_HOSTS = ['*'] with a whitelist of known, trusted hostnames for your deployment.
  • Verify that all outbound URLs—including invite emails, pagination links, and OpenAPI definitions—use validated host information and that request.build_absolute_uri() calls are protected against untrusted headers.
  • Consider disabling the invite link feature or restricting invitation creation until a secure release is installed.

Generated by OpenCVE AI on March 26, 2026 at 20:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tandoor
Tandoor recipes
CPEs cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*
Vendors & Products Tandoor
Tandoor recipes

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Tandoorrecipes
Tandoorrecipes recipes
Vendors & Products Tandoorrecipes
Tandoorrecipes recipes

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Description Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Versions up to and including 2.5.3 set ALLOWED_HOSTS = '*' by default, which causes Django to accept any value in the HTTP Host header without validation. The application uses request.build_absolute_uri() to generate absolute URLs in multiple contexts, including invite link emails, API pagination, and OpenAPI schema generation. An attacker who can send requests to the application with a crafted Host header can manipulate all server-generated absolute URLs. The most critical impact is invite link poisoning: when an admin creates an invite and the application sends the invite email, the link points to the attacker's server instead of the real application. When the victim clicks the link, the invite token is sent to the attacker, who can then use it at the real application. As of time of publication, it is unknown if a patched version is available.
Title Tandoor Recipes Vulnerable to Host Header Injection
Weaknesses CWE-644
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N'}


Subscriptions

Tandoor Recipes
Tandoorrecipes Recipes
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-30T14:55:52.270Z

Reserved: 2026-03-17T21:17:08.885Z

Link: CVE-2026-33149

cve-icon Vulnrichment

Updated: 2026-03-30T13:58:29.813Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T19:17:02.967

Modified: 2026-04-23T15:11:56.983

Link: CVE-2026-33149

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:42Z

Weaknesses