CVE-2025-57396

Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tandoor:recipes:2.0.0:alpha1:*:*:*:*:*:*

History

03 Oct 2025, 16:58

Type Values Removed Values Added
CPE cpe:2.3:a:tandoor:recipes:2.0.0:alpha1:*:*:*:*:*:*
First Time Tandoor
Tandoor recipes
References () https://m10x.de/posts/2025/08/continuous-checks-are-important-privilege-escalation-in-tandoor-recipes/ - () https://m10x.de/posts/2025/08/continuous-checks-are-important-privilege-escalation-in-tandoor-recipes/ - Exploit, Third Party Advisory

19 Sep 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-269

19 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-19 20:15

Updated : 2025-10-03 16:58


NVD link : CVE-2025-57396

Mitre link : CVE-2025-57396

CVE.ORG link : CVE-2025-57396


JSON object : View

Products Affected

tandoor

  • recipes
CWE
CWE-269

Improper Privilege Management