CVE-2026-35489
HIGHTandoor Recipes — `amount`/`unit` bypass serializer in `food/{id}/shopping/`
Title source: cnaDescription
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from request.data and passes them without validation to ShoppingListEntry.objects.create(). Invalid amount values (non-numeric strings) cause an unhandled exception and HTTP 500. A unit ID from a different Space can be associated cross-space, leaking foreign-key references across tenant boundaries. All other endpoints creating ShoppingListEntry use ShoppingListEntrySerializer, which validates and sanitizes these fields. This vulnerability is fixed in 2.6.4.
Scores
CVSS v3
7.3
EPSS
0.0014
EPSS Percentile
32.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-1284
CWE-639
Status
published
Products (2)
tandoor/recipes
< 2.6.4
TandoorRecipes/recipes
< 2.6.4
Published
Apr 07, 2026
Tracked Since
Apr 07, 2026