Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, RecipeBookViewSet and RecipeBookEntryViewSet use CustomIsShared as an alternative permission class, but CustomIsShared.has_object_permission() returns True for all HTTP methods — including DELETE, PUT, and PATCH — without checking request.method in SAFE_METHODS. Any user who is in the shared list of a RecipeBook can delete or overwrite it, even though shared access is semantically read-only. This vulnerability is fixed in 2.6.4.
Published: 2026-04-07
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data modification through privilege escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists in Tandoor Recipes, where the CustomIsShared permission component incorrectly grants all HTTP methods—DELETE, PUT, and PATCH—without verifying that the request is safe. Users who are listed as shared members of a RecipeBook, who are supposed to have read‑only access, can therefore delete or overwrite the entire book. This results in unauthorized data modification and effectively elevates a read‑only user to have full control over the targeted RecipeBook.

Affected Systems

The issue affects the Tandoor Recipes application for the recipes product. All releases earlier than version 2.6.4 are vulnerable, including the corresponding RecipeBookViewSet and RecipeBookEntryViewSet. Production deployments of the recipes application running any pre‑2.6.4 build are susceptible.

Risk and Exploitability

The CVSS score of 8.1 reflects a high severity of the defect, indicating significant impact if exploited. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed exploits to date. The attack requires authenticated access as a user who has been granted shared read‑only rights; the attacker can then issue DELETE or PUT HTTP requests against the shared RecipeBook API endpoints. Because the flaw lies in the permission layer, exploitation is straightforward for anyone with shared access, making the vulnerability highly actionable for malicious insiders or compromised shared users.

Generated by OpenCVE AI on April 7, 2026 at 22:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Tandoor Recipes to version 2.6.4 or later
  • Verify that the RecipeBookEntryViewSet and RecipeBookViewSet use the corrected permission logic
  • Monitor shared RecipeBook activity for unexpected deletions or updates
  • Consult the vendor’s release notes or security advisories for additional updates

Generated by OpenCVE AI on April 7, 2026 at 22:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Tandoorrecipes
Tandoorrecipes recipes
Vendors & Products Tandoorrecipes
Tandoorrecipes recipes

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, RecipeBookViewSet and RecipeBookEntryViewSet use CustomIsShared as an alternative permission class, but CustomIsShared.has_object_permission() returns True for all HTTP methods — including DELETE, PUT, and PATCH — without checking request.method in SAFE_METHODS. Any user who is in the shared list of a RecipeBook can delete or overwrite it, even though shared access is semantically read-only. This vulnerability is fixed in 2.6.4.
Title Tandoor Recipes — CustomIsShared permits DELETE/PUT on RecipeBook by shared (read-only) users
Weaknesses CWE-749
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Tandoorrecipes Recipes
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T14:48:54.946Z

Reserved: 2026-04-02T20:49:44.454Z

Link: CVE-2026-35488

cve-icon Vulnrichment

Updated: 2026-04-08T14:48:46.370Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T16:16:27.003

Modified: 2026-04-08T21:27:00.663

Link: CVE-2026-35488

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:37Z

Weaknesses