Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the FDC (USDA FoodData Central) search endpoint constructs an upstream API URL by directly interpolating the user-supplied `query` parameter into the URL string without URL-encoding. An attacker can inject additional URL parameters by including `&` characters in the query value. This allows overriding the API key, manipulating upstream query behavior, and causing server crashes (HTTP 500) via malformed requests — a Denial of Service condition. Version 2.6.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-43p3-wx6h-9g7w | Exploit Vendor Advisory |
Configurations
History
30 Mar 2026, 19:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-43p3-wx6h-9g7w - Exploit, Vendor Advisory | |
| First Time |
Tandoor recipes
Tandoor |
|
| CPE | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* |
Information
Published : 2026-03-26 19:17
Updated : 2026-03-30 19:26
NVD link : CVE-2026-33148
Mitre link : CVE-2026-33148
CVE.ORG link : CVE-2026-33148
JSON object : View
Products Affected
tandoor
- recipes
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
