Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, Tandoor Recipes allows authenticated users to inject arbitrary <style> tags into recipe step instructions. The bleach.clean() sanitizer explicitly whitelists the <style> tag, causing the backend to persist and serve unsanitized CSS payloads via the API. Any client consuming instructions_markdown from the API and rendering it as HTML without additional sanitization will execute attacker-controlled CSS — enabling UI redressing, phishing overlays, visual defacement, and CSS-based data exfiltration. This vulnerability is fixed in 2.6.4.
References
| Link | Resource |
|---|---|
| https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 | Release Notes |
| https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-9hhh-g2fc-r8x2 | Exploit Vendor Advisory |
| https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-9hhh-g2fc-r8x2 | Exploit Vendor Advisory |
Configurations
History
10 Apr 2026, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* | |
| References | () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 - Release Notes | |
| References | () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-9hhh-g2fc-r8x2 - Exploit, Vendor Advisory | |
| First Time |
Tandoor
Tandoor recipes |
07 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-9hhh-g2fc-r8x2 - |
06 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 18:16
Updated : 2026-04-10 18:33
NVD link : CVE-2026-35046
Mitre link : CVE-2026-35046
CVE.ORG link : CVE-2026-35046
JSON object : View
Products Affected
tandoor
- recipes
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
