Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tandoor
Tandoor recipes |
|
| CPEs | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tandoor
Tandoor recipes |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tandoorrecipes
Tandoorrecipes recipes |
|
| Vendors & Products |
Tandoorrecipes
Tandoorrecipes recipes |
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4. | |
| Title | Tandoor Recipes Affected by Private Recipe Exposure and Unauthorized Modification | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:29:07.687Z
Reserved: 2026-03-31T21:06:06.428Z
Link: CVE-2026-35045
Updated: 2026-04-07T14:28:09.234Z
Status : Analyzed
Published: 2026-04-06T18:16:42.133
Modified: 2026-04-10T18:32:17.580
Link: CVE-2026-35045
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:27:41Z