Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the Recipe API endpoint exposes a hidden `?debug=true` query parameter that returns the complete raw SQL query being executed, including all table names, column names, JOIN relationships, WHERE conditions (revealing access control logic), and multi-tenant space IDs. This parameter works even when Django's `DEBUG=False` (production mode) and is accessible to any authenticated user regardless of their privilege level. This allows a low-privilege attacker to map the entire database schema and reverse-engineer the authorization model. Version 2.6.0 patches the issue.
INFO
Published Date :
2026-03-26T19:06:16.020Z
Last Modified :
2026-03-26T19:52:10.149Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33153 vulnerability.
| Vendors | Products |
|---|---|
| Tandoorrecipes |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33153.