Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0 | Release Notes |
| https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522 | Exploit Vendor Advisory |
Configurations
History
30 Mar 2026, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tandoor recipes
Tandoor |
|
| References | () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0 - Release Notes | |
| References | () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:* |
Information
Published : 2026-03-26 19:17
Updated : 2026-03-30 19:18
NVD link : CVE-2026-33152
Mitre link : CVE-2026-33152
CVE.ORG link : CVE-2026-33152
JSON object : View
Products Affected
tandoor
- recipes
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
