CVE-2026-33152: Tandoor Recipes
CVE-2026-33152
Bypasses API authentication to enable unlimited password guessing in Tandoor Recipes. Compromises any user account via brute-force. Upgrade to version 2.6.0 to patch immediately.
Patch now - CVE-2026-33152 is a critical authentication bypass in Tandoor Recipes that lets attackers perform unlimited password-guessing attacks against any user account via the API. Upgrade to version 2.6.0 to block brute-force logins.
Overview
A critical security vulnerability has been discovered in Tandoor Recipes, a popular web application for managing recipes, meal planning, and shopping lists. This flaw, tracked as CVE-2026-33152, allows attackers to bypass critical security protections and perform unlimited password-guessing attacks against user accounts.
Vulnerability Explained
In simple terms, the application had a mismatch in its security controls. The standard web login page correctly limited login attempts to five per minute per IP address. However, the programming interface (API) that the application uses internally was configured to accept a different, more basic type of login that completely ignored these limits.
An attacker can target any API endpoint using “Basic Authentication” headers. This method allows them to submit username and password combinations at extremely high speed, with no account lockout and no limit on the number of attempts. This makes it trivial to perform brute-force attacks against any known username.
Potential Impact
The impact of this vulnerability is severe. Attackers can:
- Compromise User Accounts: By systematically guessing passwords, they can gain unauthorized access to any user account.
- Steal Sensitive Data: This includes personal recipe collections, meal plans, and associated data.
- Pivot to Further Attacks: A compromised account could be used to manipulate shopping lists or, if the application is hosted alongside other services, potentially launch further attacks.
This type of flaw is a primary vector for credential stuffing attacks, where attackers use passwords leaked from other breaches. You can review historical incidents to understand the scale of this threat in our breach reports.
Remediation and Mitigation
Immediate action is required to protect your Tandoor Recipes instance.
Primary Fix:
- Upgrade Immediately: All users must upgrade to Tandoor Recipes version 2.6.0 or later. This version patches the vulnerability by removing the insecure authentication backend from the API.
Verification and Additional Steps:
- Confirm Your Version: After upgrading, verify your installation is running version 2.6.0 or higher.
- Monitor for Suspicious Activity: Review application logs for a high volume of authentication attempts, especially those using
Basicauthentication headers, which may indicate a prior attack. - Encourage Strong Passwords: Advise users to ensure they are using strong, unique passwords. Consider this a mandatory step if you suspect any exploitation attempt.
For the latest updates on critical vulnerabilities like this one, follow our security news section. Staying informed is key to maintaining a strong security posture and preventing unauthorized access to your systems and user data.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation vulnerability that allows attackers to create administrator accounts by submitting crafted requests to the AJAX handler....
WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers ...
OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments. Atta...
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global ma...