Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4.
Published: 2026-04-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Modification and Private Data Exposure
Action: Immediate Patch
AI Analysis

Impact

Tandoor Recipes is a recipe management application that stores user recipes, meal plans, and shopping lists. This vulnerability resides in the batch update API endpoint, which erroneously permits any authenticated member of a recipe Space to modify every recipe within that Space, irrespective of each recipe's privacy setting. Because the authorization checks that normally protect individual recipe updates are bypassed, an attacker can force private recipes to become visible, grant themselves unauthorized access through shared lists, and alter metadata such as recipe names or instructions. The exposure of private content and the ability to change recipe data compromise confidentiality and integrity for affected users, while potentially impacting availability if critical recipes are deleted or corrupted.

Affected Systems

Tandoor Recipes versions prior to 2.6.4 are affected. The issue impacts any deployment where the API is exposed – including self‑hosted installations and hosted instances – as long as an authenticated user belongs to the same Space as the target recipes. All product releases before the 2.6.4 update inherit this flaw, so a review of the installed version is required for every site hosting the application.

Risk and Exploitability

The CVSS score of 8.1 indicates a high risk level, but the EPSS score of less than 1% suggests that real‑world exploitation is currently unlikely. The vulnerability does not appear in the CISA KEV catalog, further reducing the immediate threat perception. Nevertheless, the attack surface is limited to authenticated users with membership in a Space, meaning that malicious insiders or compromised accounts could leverage the flaw. Exploiting the vulnerability requires sending a crafted PUT request to /api/recipe/batch_update/ with a payload affecting the desired recipes – no special privileges beyond Space membership are needed. Because the vulnerability operates entirely within the authentication context, defenders should verify that no broader entitlement is being granted inadvertently.

Generated by OpenCVE AI on April 10, 2026 at 19:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to version 2.6.4 or newer.
  • If an immediate upgrade is not feasible, temporarily disable or lock the /api/recipe/batch_update/ endpoint or restrict its use to administrative roles only.
  • Review and tighten the permissions for existing Space members to ensure they cannot perform bulk updates unless explicitly authorized.
  • Enable auditing or logging for recipe updates to detect suspicious changes.
  • After mitigation, verify that private recipes no longer appear to unauthorized members.

Generated by OpenCVE AI on April 10, 2026 at 19:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tandoor
Tandoor recipes
CPEs cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*
Vendors & Products Tandoor
Tandoor recipes

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Tandoorrecipes
Tandoorrecipes recipes
Vendors & Products Tandoorrecipes
Tandoorrecipes recipes

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4.
Title Tandoor Recipes Affected by Private Recipe Exposure and Unauthorized Modification
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Tandoor Recipes
Tandoorrecipes Recipes
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T14:29:07.687Z

Reserved: 2026-03-31T21:06:06.428Z

Link: CVE-2026-35045

cve-icon Vulnrichment

Updated: 2026-04-07T14:28:09.234Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T18:16:42.133

Modified: 2026-04-10T18:32:17.580

Link: CVE-2026-35045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:41Z

Weaknesses