Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4.
References
| Link | Resource |
|---|---|
| https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 | Release Notes |
| https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-v8x3-w674-55p5 | Exploit Vendor Advisory |
Configurations
History
10 Apr 2026, 18:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* | |
| References | () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 - Release Notes | |
| References | () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-v8x3-w674-55p5 - Exploit, Vendor Advisory | |
| First Time |
Tandoor
Tandoor recipes |
06 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 18:16
Updated : 2026-04-10 18:32
NVD link : CVE-2026-35045
Mitre link : CVE-2026-35045
CVE.ORG link : CVE-2026-35045
JSON object : View
Products Affected
tandoor
- recipes
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
