Vulnerability Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from request.data and passes them without validation to ShoppingListEntry.objects.create(). Invalid amount values (non-numeric strings) cause an unhandled exception and HTTP 500. A unit ID from a different Space can be associated cross-space, leaking foreign-key references across tenant boundaries. All other endpoints creating ShoppingListEntry use ShoppingListEntrySerializer, which validates and sanitizes these fields. This vulnerability is fixed in 2.6.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tandoor | Recipes | < 2.6.4 |
Related Weaknesses (CWE)
References
- https://github.com/TandoorRecipes/recipes/releases/tag/2.6.4ProductRelease Notes
- https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-8w8h-3pv2-355ExploitMitigationVendor Advisory
- https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-8w8h-3pv2-355ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-35489?
CVE-2026-35489 is a vulnerability with a CVSS score of 7.3 (HIGH). Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from requ...
How severe is CVE-2026-35489?
CVE-2026-35489 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35489?
Check the references section above for vendor advisories and patch information. Affected products include: Tandoor Recipes.