Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29055: CWE-1230: Exposure of Sensitive Information Through Metadata in TandoorRecipes recipes

0
Medium
VulnerabilityCVE-2026-29055cvecve-2026-29055cwe-1230
Published: Thu Mar 26 2026 (03/26/2026, 19:03:06 UTC)
Source: CVE Database V5
Vendor/Project: TandoorRecipes
Product: recipes

Description

CVE-2026-29055 is a medium-severity vulnerability in Tandoor Recipes versions prior to 2. 6. 0 where the application fails to strip EXIF metadata from uploaded WebP and GIF images. This results in sensitive information such as GPS coordinates, camera model, timestamps, and software details being exposed to any user viewing the recipe images. The vulnerability arises because the image processing pipeline explicitly skips metadata stripping for these formats, as acknowledged by a developer comment. Exploitation requires no authentication or user interaction and can be performed remotely by uploading crafted images. The issue is fixed in version 2. 6. 0. Organizations using affected versions risk inadvertent leakage of sensitive location and device information, potentially aiding targeted attacks or privacy violations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 19:47:16 UTC

Technical Analysis

The vulnerability identified as CVE-2026-29055 affects Tandoor Recipes, a popular application for recipe management, meal planning, and shopping list creation. In versions before 2.6.0, the image processing pipeline does not remove EXIF metadata from WebP and GIF images uploaded by users. EXIF metadata often contains sensitive details such as GPS coordinates, camera make and model, timestamps, and software used to capture or edit the image. This oversight is due to the image processing code explicitly skipping metadata stripping, rescaling, and size validation for these formats, as noted in a developer TODO comment. When users upload photos in WebP format—which is the default format for many modern smartphones—this metadata remains embedded and is served to all users who can view the recipe, exposing potentially sensitive information. The vulnerability does not require authentication or user interaction to exploit, making it accessible to any remote attacker or user with upload privileges. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the confidentiality impact without affecting integrity or availability. The issue was addressed and fixed in Tandoor Recipes version 2.6.0 by implementing proper EXIF metadata stripping for all supported image formats.

Potential Impact

The primary impact of this vulnerability is the unintended disclosure of sensitive user information embedded in image metadata. Exposure of GPS coordinates can reveal precise user locations, potentially compromising user privacy and safety. Information about camera models and timestamps can aid attackers in profiling victims or correlating data for social engineering or targeted attacks. For organizations, this leakage could violate privacy policies or regulatory requirements, especially if users upload images from sensitive locations such as corporate premises or private residences. Although the vulnerability does not affect system integrity or availability, the confidentiality breach can erode user trust and lead to reputational damage. Since exploitation requires only image upload capability, any user or attacker with upload access can trigger the exposure, increasing the risk in multi-user or public-facing deployments. The lack of known exploits in the wild suggests limited active exploitation but does not diminish the potential privacy risks.

Mitigation Recommendations

Organizations and users should upgrade Tandoor Recipes to version 2.6.0 or later, where the vulnerability is fixed by proper EXIF metadata stripping for all image formats. Until upgrading is possible, administrators can implement server-side image processing controls to strip metadata from uploaded images before storage or display, using tools like ExifTool or ImageMagick with metadata removal options. Restricting image upload privileges to trusted users can reduce exposure risk. Additionally, educating users about the risks of uploading images containing sensitive metadata and encouraging them to sanitize images locally before upload can help mitigate leakage. Monitoring and auditing uploaded images for embedded metadata can detect ongoing exposure. Finally, reviewing privacy policies and informing users about potential metadata exposure enhances transparency and compliance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T17:50:11.244Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c589313c064ed76fb167bb

Added to database: 3/26/2026, 7:29:53 PM

Last enriched: 3/26/2026, 7:47:16 PM

Last updated: 3/27/2026, 5:11:23 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses