Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tandoor
Tandoor recipes |
|
| CPEs | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tandoor
Tandoor recipes |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tandoorrecipes
Tandoorrecipes recipes |
|
| Vendors & Products |
Tandoorrecipes
Tandoorrecipes recipes |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from request.data and passes them without validation to ShoppingListEntry.objects.create(). Invalid amount values (non-numeric strings) cause an unhandled exception and HTTP 500. A unit ID from a different Space can be associated cross-space, leaking foreign-key references across tenant boundaries. All other endpoints creating ShoppingListEntry use ShoppingListEntrySerializer, which validates and sanitizes these fields. This vulnerability is fixed in 2.6.4. | |
| Title | Tandoor Recipes — `amount`/`unit` bypass serializer in `food/{id}/shopping/` | |
| Weaknesses | CWE-1284 CWE-639 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T15:58:45.810Z
Reserved: 2026-04-02T20:49:44.454Z
Link: CVE-2026-35489
Updated: 2026-04-07T15:57:33.375Z
Status : Analyzed
Published: 2026-04-07T16:16:27.160
Modified: 2026-04-14T20:13:00.487
Link: CVE-2026-35489
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z