Tandoor Recipes 2.0.0-alpha-1 is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.

This vulnerable version was released soon after I published the second part of my series, ‘All Your Recipe Are Belong to Us’, in which I tested - among others - Tandoor Recipes for vulnerabilities. This highlights the importance of continuous checks!

Overview of the Vulnerabilities

CVENameCVSS Score
CVE-2025-PENDINGPrivilege Escalation8.8 High

Remediation

The maintainer reacted quickly and professionally. The vulnerability has been fixed in Tandoor Recipes version 2.0.0-alpha-2.

Vulnerabilities in Detail

[CVE-2025-PENDING] Privilege Escalation (8.8 High)

Users are allowed to update their names:

Tandoor1

In this case the following API Call was sent:

Tandoor2

The regular user is able to modify the parameters is_staff and is_superuser to true, in order to grant themself those privileges:

Tandoor3

Thus, the user has now the staff and admin privileges (just as already revealed by the previous api response)

Tandoor4

Timeline

DateEvent
2025-04-07Discovered and reported the vulnerability
2025-04-09Maintainer acknowledged the vulnerabilities thankfully
2025-04-18Maintainer fixed the privilege escalation in version 2.0.0-alpha-2