CVE-2026-35045

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*

History

10 Apr 2026, 18:32

Type Values Removed Values Added
CPE cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*
References () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 - () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 - Release Notes
References () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-v8x3-w674-55p5 - () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-v8x3-w674-55p5 - Exploit, Vendor Advisory
First Time Tandoor
Tandoor recipes

06 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 18:16

Updated : 2026-04-10 18:32


NVD link : CVE-2026-35045

Mitre link : CVE-2026-35045

CVE.ORG link : CVE-2026-35045


JSON object : View

Products Affected

tandoor

  • recipes
CWE
CWE-639

Authorization Bypass Through User-Controlled Key