Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
References
Link | Resource |
---|---|
https://m10x.de/posts/2025/08/continuous-checks-are-important-privilege-escalation-in-tandoor-recipes/ | Exploit Third Party Advisory |
Configurations
History
03 Oct 2025, 16:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tandoor:recipes:2.0.0:alpha1:*:*:*:*:*:* | |
First Time |
Tandoor
Tandoor recipes |
|
References | () https://m10x.de/posts/2025/08/continuous-checks-are-important-privilege-escalation-in-tandoor-recipes/ - Exploit, Third Party Advisory |
19 Sep 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-269 |
19 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-19 20:15
Updated : 2025-10-03 16:58
NVD link : CVE-2025-57396
Mitre link : CVE-2025-57396
CVE.ORG link : CVE-2025-57396
JSON object : View
Products Affected
tandoor
- recipes
CWE
CWE-269
Improper Privilege Management