CVE-2026-25964: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TandoorRecipes recipes
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, a Path Traversal vulnerability in the RecipeImport workflow of Tandoor Recipes allows authenticated users with import permissions to read arbitrary files on the server. This vulnerability stems from a lack of input validation in the file_path parameter and insufficient checks in the Local storage backend, enabling an attacker to bypass storage directory restrictions and access sensitive system files (e.g., /etc/passwd) or application configuration files (e.g., settings.py), potentially leading to full system compromise. This vulnerability is fixed in 2.5.1.
AI Analysis
Technical Summary
CVE-2026-25964 is a path traversal vulnerability identified in the RecipeImport workflow of the Tandoor Recipes application, a tool used for managing recipes, meal planning, and shopping lists. The vulnerability exists in versions prior to 2.5.1 and is caused by improper input validation of the file_path parameter combined with insufficient enforcement of directory restrictions in the local storage backend. Authenticated users with import permissions can exploit this flaw to traverse outside the intended storage directory and access arbitrary files on the server filesystem. This can include critical system files such as /etc/passwd, which contains user account information, or application-specific configuration files like settings.py, which may contain sensitive credentials or configuration details. Although the vulnerability requires authentication with specific permissions, it does not require additional user interaction, making exploitation straightforward for authorized users. The vulnerability has a CVSS 3.1 base score of 4.9, reflecting medium severity due to the need for privileges but high confidentiality impact. No known exploits have been reported in the wild, but the potential for full system compromise exists if attackers leverage the disclosed information to escalate privileges or pivot within the environment. The issue was resolved in Tandoor Recipes version 2.5.1 by implementing proper input validation and enforcing strict directory restrictions in the storage backend.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to those deploying Tandoor Recipes in environments where multiple users have import permissions. Unauthorized access to sensitive system and application files can lead to information disclosure, including user credentials and configuration secrets, which may facilitate further attacks such as privilege escalation or lateral movement. Organizations in sectors with strict data protection regulations (e.g., healthcare, finance, public sector) could face compliance violations if sensitive data is exposed. The medium CVSS score reflects the requirement for authenticated access, but the potential confidentiality impact is high. If exploited, attackers could gain insights into system configurations or user data, undermining trust and operational security. Additionally, since Tandoor Recipes is a niche application, the impact is more pronounced in organizations that rely on it for operational workflows, especially those with less mature access control policies. The absence of known exploits reduces immediate risk but should not lead to complacency, as attackers may develop exploits given the public disclosure.
Mitigation Recommendations
European organizations should immediately upgrade Tandoor Recipes to version 2.5.1 or later to remediate the vulnerability. Until patching is complete, restrict import permissions strictly to trusted and necessary users only. Implement robust access controls and monitor usage of the import functionality for unusual activity. Conduct regular audits of user permissions and review logs for attempts to access unauthorized files. Employ network segmentation to isolate servers running Tandoor Recipes from critical infrastructure to limit potential lateral movement. Additionally, consider deploying file integrity monitoring on critical configuration files to detect unauthorized access or changes. Educate administrators and users about the risks of path traversal vulnerabilities and the importance of applying security updates promptly. Finally, integrate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-25964: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TandoorRecipes recipes
Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, a Path Traversal vulnerability in the RecipeImport workflow of Tandoor Recipes allows authenticated users with import permissions to read arbitrary files on the server. This vulnerability stems from a lack of input validation in the file_path parameter and insufficient checks in the Local storage backend, enabling an attacker to bypass storage directory restrictions and access sensitive system files (e.g., /etc/passwd) or application configuration files (e.g., settings.py), potentially leading to full system compromise. This vulnerability is fixed in 2.5.1.
AI-Powered Analysis
Technical Analysis
CVE-2026-25964 is a path traversal vulnerability identified in the RecipeImport workflow of the Tandoor Recipes application, a tool used for managing recipes, meal planning, and shopping lists. The vulnerability exists in versions prior to 2.5.1 and is caused by improper input validation of the file_path parameter combined with insufficient enforcement of directory restrictions in the local storage backend. Authenticated users with import permissions can exploit this flaw to traverse outside the intended storage directory and access arbitrary files on the server filesystem. This can include critical system files such as /etc/passwd, which contains user account information, or application-specific configuration files like settings.py, which may contain sensitive credentials or configuration details. Although the vulnerability requires authentication with specific permissions, it does not require additional user interaction, making exploitation straightforward for authorized users. The vulnerability has a CVSS 3.1 base score of 4.9, reflecting medium severity due to the need for privileges but high confidentiality impact. No known exploits have been reported in the wild, but the potential for full system compromise exists if attackers leverage the disclosed information to escalate privileges or pivot within the environment. The issue was resolved in Tandoor Recipes version 2.5.1 by implementing proper input validation and enforcing strict directory restrictions in the storage backend.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to those deploying Tandoor Recipes in environments where multiple users have import permissions. Unauthorized access to sensitive system and application files can lead to information disclosure, including user credentials and configuration secrets, which may facilitate further attacks such as privilege escalation or lateral movement. Organizations in sectors with strict data protection regulations (e.g., healthcare, finance, public sector) could face compliance violations if sensitive data is exposed. The medium CVSS score reflects the requirement for authenticated access, but the potential confidentiality impact is high. If exploited, attackers could gain insights into system configurations or user data, undermining trust and operational security. Additionally, since Tandoor Recipes is a niche application, the impact is more pronounced in organizations that rely on it for operational workflows, especially those with less mature access control policies. The absence of known exploits reduces immediate risk but should not lead to complacency, as attackers may develop exploits given the public disclosure.
Mitigation Recommendations
European organizations should immediately upgrade Tandoor Recipes to version 2.5.1 or later to remediate the vulnerability. Until patching is complete, restrict import permissions strictly to trusted and necessary users only. Implement robust access controls and monitor usage of the import functionality for unusual activity. Conduct regular audits of user permissions and review logs for attempts to access unauthorized files. Employ network segmentation to isolate servers running Tandoor Recipes from critical infrastructure to limit potential lateral movement. Additionally, consider deploying file integrity monitoring on critical configuration files to detect unauthorized access or changes. Educate administrators and users about the risks of path traversal vulnerabilities and the importance of applying security updates promptly. Finally, integrate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T17:13:54.066Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698f723cc9e1ff5ad857abd4
Added to database: 2/13/2026, 6:49:32 PM
Last enriched: 2/13/2026, 7:04:12 PM
Last updated: 2/13/2026, 9:09:42 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26208: CWE-502: Deserialization of Untrusted Data in Alex4SSB ADB-Explorer
HighCVE-2026-26190: CWE-306: Missing Authentication for Critical Function in milvus-io milvus
CriticalCVE-2026-2441: Use after free in Google Chrome
HighCVE-2026-26187: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in treeverse lakeFS
HighCVE-2026-25991: CWE-918: Server-Side Request Forgery (SSRF) in TandoorRecipes recipes
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.