NIXPKGS-2026-0958
GitHub issue
published on
Permalink
CVE-2026-35045
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
by @ADMIN Activity log
- Created suggestion
- @LeSuisse ignored package gnome-recipes
- @LeSuisse deleted maintainer @jvanbruegge maintainer.delete
- @LeSuisse accepted
- @LeSuisse published on GitHub
- @LeSuisse accepted
- @ADMIN published on GitHub
Tandoor Recipes Affected by Private Recipe Exposure and Unauthorized Modification
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4.
References
-
https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4 x_refsource_MISC
Affected products
recipes
- ==< 2.6.4
Matching in nixpkgs
Ignored packages (1)
pkgs.gnome-recipes
Recipe management application for GNOME
Package maintainers
Ignored maintainers (1)
-
@jvanbruegge Jan van Brügge <supermanitu@gmail.com>