CVE-2026-35489

HIGH

Tandoor Recipes — `amount`/`unit` bypass serializer in `food/{id}/shopping/`

Title source: cna
STIX 2.1

Description

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from request.data and passes them without validation to ShoppingListEntry.objects.create(). Invalid amount values (non-numeric strings) cause an unhandled exception and HTTP 500. A unit ID from a different Space can be associated cross-space, leaking foreign-key references across tenant boundaries. All other endpoints creating ShoppingListEntry use ShoppingListEntrySerializer, which validates and sanitizes these fields. This vulnerability is fixed in 2.6.4.

Scores

CVSS v3 7.3
EPSS 0.0014
EPSS Percentile 32.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-1284 CWE-639
Status published
Products (2)
tandoor/recipes < 2.6.4
TandoorRecipes/recipes < 2.6.4
Published Apr 07, 2026
Tracked Since Apr 07, 2026