Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue.
PUBLISHED5.2CWE-307
Tandoor Recipes Vulnerable to Unrestricted Brute-Force via BasicAuthentication
Problem type
Affected products
TandoorRecipes
recipes
< 2.6.0 - AFFECTED
References
https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522
https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522
https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0
https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-33152Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-33152",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"dateUpdated": "2026-03-26T19:52:09.977Z",
"dateReserved": "2026-03-17T21:17:08.885Z",
"datePublished": "2026-03-26T19:07:39.225Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2026-03-26T19:07:39.225Z"
},
"title": "Tandoor Recipes Vulnerable to Unrestricted Brute-Force via BasicAuthentication",
"descriptions": [
{
"lang": "en",
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue."
}
],
"affected": [
{
"vendor": "TandoorRecipes",
"product": "recipes",
"versions": [
{
"version": "< 2.6.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-307: Improper Restriction of Excessive Authentication Attempts",
"cweId": "CWE-307",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522",
"name": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-7m7c-jjqc-r522",
"tags": [
"x_refsource_CONFIRM"
]
},
{
"url": "https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0",
"name": "https://github.com/TandoorRecipes/recipes/releases/tag/2.6.0",
"tags": [
"x_refsource_MISC"
]
}
],
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T19:52:09.977Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}