CVE-2026-33152: Tandoor Recipes
CVE-2026-33152
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthenticati...
Overview
A critical security vulnerability has been discovered in Tandoor Recipes, a popular web application for managing recipes, meal planning, and shopping lists. This flaw, tracked as CVE-2026-33152, allows attackers to bypass critical security protections and perform unlimited password-guessing attacks against user accounts.
Vulnerability Explained
In simple terms, the application had a mismatch in its security controls. The standard web login page correctly limited login attempts to five per minute per IP address. However, the programming interface (API) that the application uses internally was configured to accept a different, more basic type of login that completely ignored these limits.
An attacker can target any API endpoint using “Basic Authentication” headers. This method allows them to submit username and password combinations at extremely high speed, with no account lockout and no limit on the number of attempts. This makes it trivial to perform brute-force attacks against any known username.
Potential Impact
The impact of this vulnerability is severe. Attackers can:
- Compromise User Accounts: By systematically guessing passwords, they can gain unauthorized access to any user account.
- Steal Sensitive Data: This includes personal recipe collections, meal plans, and associated data.
- Pivot to Further Attacks: A compromised account could be used to manipulate shopping lists or, if the application is hosted alongside other services, potentially launch further attacks.
This type of flaw is a primary vector for credential stuffing attacks, where attackers use passwords leaked from other breaches. You can review historical incidents to understand the scale of this threat in our breach reports.
Remediation and Mitigation
Immediate action is required to protect your Tandoor Recipes instance.
Primary Fix:
- Upgrade Immediately: All users must upgrade to Tandoor Recipes version 2.6.0 or later. This version patches the vulnerability by removing the insecure authentication backend from the API.
Verification and Additional Steps:
- Confirm Your Version: After upgrading, verify your installation is running version 2.6.0 or higher.
- Monitor for Suspicious Activity: Review application logs for a high volume of authentication attempts, especially those using
Basicauthentication headers, which may indicate a prior attack. - Encourage Strong Passwords: Advise users to ensure they are using strong, unique passwords. Consider this a mandatory step if you suspect any exploitation attempt.
For the latest updates on critical vulnerabilities like this one, follow our security news section. Staying informed is key to maintaining a strong security posture and preventing unauthorized access to your systems and user data.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address r...