CVE-2026-33152

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*

History

30 Mar 2026, 19:18

Type Values Removed Values Added
First Time Tandoor recipes
Tandoor
References () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0 - () https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0 - Release Notes
References () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522 - () https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522 - Exploit, Vendor Advisory
CPE cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*

Information

Published : 2026-03-26 19:17

Updated : 2026-03-30 19:18


NVD link : CVE-2026-33152

Mitre link : CVE-2026-33152

CVE.ORG link : CVE-2026-33152


JSON object : View

Products Affected

tandoor

  • recipes
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts