Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the image processing pipeline in Tandoor Recipes explicitly skips EXIF metadata stripping, image rescaling, and size validation for WebP and GIF image formats. A developer TODO comment in the source code acknowledges this as a known issue. As a result, when users upload recipe photos in WebP format (the default format for modern smartphone cameras), their sensitive EXIF data — including GPS coordinates, camera model, timestamps, and software information — is stored and served to all users who can view the recipe. Version 2.6.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0 | Release Notes |
| https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-9g2j-xccg-9mhq | Exploit Vendor Advisory |
Configurations
History
30 Mar 2026, 19:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0 - Release Notes | |
| References | () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-9g2j-xccg-9mhq - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* | |
| First Time |
Tandoor recipes
Tandoor |
Information
Published : 2026-03-26 19:16
Updated : 2026-03-30 19:27
NVD link : CVE-2026-29055
Mitre link : CVE-2026-29055
CVE.ORG link : CVE-2026-29055
JSON object : View
Products Affected
tandoor
- recipes
CWE
CWE-1230
Exposure of Sensitive Information Through Metadata
