Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, a Path Traversal vulnerability in the RecipeImport workflow of Tandoor Recipes allows authenticated users with import permissions to read arbitrary files on the server. This vulnerability stems from a lack of input validation in the file_path parameter and insufficient checks in the Local storage backend, enabling an attacker to bypass storage directory restrictions and access sensitive system files (e.g., /etc/passwd) or application configuration files (e.g., settings.py), potentially leading to full system compromise. This vulnerability is fixed in 2.5.1.
INFO
Published Date :
2026-02-13T18:27:08.973Z
Last Modified :
2026-02-13T20:01:40.545Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-25964 vulnerability.
| Vendors | Products |
|---|---|
| Tandoor |
|
| Tandoorrecipes |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25964.