Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30245 | Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level. |
Fri, 03 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tandoor:recipes:2.0.0:alpha1:*:*:*:*:*:* |
Mon, 22 Sep 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tandoor
Tandoor recipes |
|
| Vendors & Products |
Tandoor
Tandoor recipes |
Fri, 19 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 | |
| Metrics |
cvssV3_1
|
Fri, 19 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-19T20:17:08.121Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57396
Updated: 2025-09-19T20:16:59.326Z
Status : Analyzed
Published: 2025-09-19T20:15:40.043
Modified: 2025-10-03T16:58:21.410
Link: CVE-2025-57396
No data.
OpenCVE Enrichment
Updated: 2025-09-22T10:06:17Z
EUVD