Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33152: CWE-307: Improper Restriction of Excessive Authentication Attempts in TandoorRecipes recipes

0
Critical
VulnerabilityCVE-2026-33152cvecve-2026-33152cwe-307
Published: Thu Mar 26 2026 (03/26/2026, 19:07:39 UTC)
Source: CVE Database V5
Vendor/Project: TandoorRecipes
Product: recipes

Description

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 19:45:15 UTC

Technical Analysis

Tandoor Recipes is a web application designed for recipe management, meal planning, and shopping list creation. Prior to version 2.6.0, it uses Django REST Framework with BasicAuthentication as a default authentication backend for its API endpoints. While the application enforces rate limiting on the HTML login endpoint (/accounts/login/) via AllAuth's ACCOUNT_RATE_LIMITS configuration (5 login attempts per minute per IP), this restriction does not extend to API endpoints that accept authenticated requests using BasicAuthentication headers. Consequently, attackers can send unlimited authentication requests with different passwords for any known username via the Authorization: Basic header without triggering rate limits or account lockouts. This flaw constitutes an improper restriction of excessive authentication attempts (CWE-307), enabling high-speed password guessing attacks. Successful exploitation can lead to credential compromise, unauthorized access, and potential data breaches. The vulnerability has been assigned CVE-2026-33152 and carries a CVSS 3.1 base score of 9.1 (critical), reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and integrity. The issue was addressed in Tandoor Recipes version 2.6.0 by applying appropriate rate limiting and lockout mechanisms to API authentication attempts.

Potential Impact

The vulnerability allows attackers to perform brute-force password guessing attacks at high speed against any known username on Tandoor Recipes API endpoints without restriction. This can lead to unauthorized access to user accounts, exposing sensitive personal data such as meal plans, recipes, and shopping lists. Compromised accounts may also be leveraged for further attacks within an organization’s environment if Tandoor Recipes is integrated with other systems or contains sensitive business information. The lack of rate limiting on API authentication increases the risk of credential stuffing and password spraying attacks, potentially resulting in widespread account compromise. Organizations relying on vulnerable versions face risks of data breaches, loss of user trust, and compliance violations. Although no known exploits are reported in the wild yet, the critical severity and ease of exploitation make this a high-priority threat requiring immediate remediation.

Mitigation Recommendations

1. Upgrade Tandoor Recipes to version 2.6.0 or later, where the vulnerability is patched with proper rate limiting on API authentication endpoints. 2. Implement additional API gateway or web application firewall (WAF) rules to enforce rate limiting and block excessive authentication attempts at the network edge. 3. Enforce strong password policies and encourage multi-factor authentication (MFA) to reduce the risk of credential compromise. 4. Monitor authentication logs for unusual patterns such as rapid failed login attempts or repeated attempts from single IP addresses. 5. Consider disabling BasicAuthentication in favor of more secure authentication methods like token-based or OAuth2 where feasible. 6. Conduct regular security assessments and penetration testing to detect similar weaknesses in authentication controls. 7. Educate users about phishing and credential reuse risks to prevent attackers from obtaining valid usernames.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.885Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c589313c064ed76fb167cd

Added to database: 3/26/2026, 7:29:53 PM

Last enriched: 3/26/2026, 7:45:15 PM

Last updated: 3/26/2026, 8:35:39 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses