Vulnerability Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the `SyncViewSet.query_synced_folder()` action in `cookbook/views/api.py` (line 903) fetches a Sync object using `get_object_or_404(Sync, pk=pk)` without including `space=request.space` in the filter. This allows an admin user in Space A to trigger sync operations (Dropbox/Nextcloud/Local import) on Sync configurations belonging to Space B, and view the resulting sync logs. Version 2.6.0 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tandoor | Recipes | < 2.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0Release Notes
- https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-6qpw-gwcq-68fVendor AdvisoryMitigation
FAQ
What is CVE-2026-28503?
CVE-2026-28503 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the `SyncViewSet.query_synced_folder()` action in `cookbook/views/api.p...
How severe is CVE-2026-28503?
CVE-2026-28503 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28503?
Check the references section above for vendor advisories and patch information. Affected products include: Tandoor Recipes.