CVE-2026-33148

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the FDC (USDA FoodData Central) search endpoint constructs an upstream API URL by directly interpolating the user-supplied `query` parameter into the URL string without URL-encoding. An attacker can inject additional URL parameters by including `&` characters in the query value. This allows overriding the API key, manipulating upstream query behavior, and causing server crashes (HTTP 500) via malformed requests — a Denial of Service condition. Version 2.6.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*

History

30 Mar 2026, 19:26

Type Values Removed Values Added
References () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-43p3-wx6h-9g7w - () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-43p3-wx6h-9g7w - Exploit, Vendor Advisory
First Time Tandoor recipes
Tandoor
CPE cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*

Information

Published : 2026-03-26 19:17

Updated : 2026-03-30 19:26


NVD link : CVE-2026-33148

Mitre link : CVE-2026-33148

CVE.ORG link : CVE-2026-33148


JSON object : View

Products Affected

tandoor

  • recipes
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')