CVE-2026-25964

MEDIUM

Tandoor Recipes <2.5.1 - Path Traversal

Title source: llm

Description

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, a Path Traversal vulnerability in the RecipeImport workflow of Tandoor Recipes allows authenticated users with import permissions to read arbitrary files on the server. This vulnerability stems from a lack of input validation in the file_path parameter and insufficient checks in the Local storage backend, enabling an attacker to bypass storage directory restrictions and access sensitive system files (e.g., /etc/passwd) or application configuration files (e.g., settings.py), potentially leading to full system compromise. This vulnerability is fixed in 2.5.1.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25964
nomisec WRITEUP 1 stars
by drkim-dev · poc
https://github.com/drkim-dev/CVE-2026-25964

Scores

CVSS v3 4.9
EPSS 0.0004
EPSS Percentile 10.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-73 CWE-22
Status published

Affected Products (1)

tandoor/recipes < 2.5.1

Timeline

Published Feb 13, 2026
Tracked Since Feb 18, 2026