Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
                
            References
                    | Link | Resource | 
|---|---|
| https://m10x.de/posts/2025/08/continuous-checks-are-important-privilege-escalation-in-tandoor-recipes/ | Exploit Third Party Advisory | 
Configurations
                    History
                    03 Oct 2025, 16:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://m10x.de/posts/2025/08/continuous-checks-are-important-privilege-escalation-in-tandoor-recipes/ - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:tandoor:recipes:2.0.0:alpha1:*:*:*:*:*:* | |
| First Time | Tandoor recipes Tandoor | 
19 Sep 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-269 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
19 Sep 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-19 20:15
Updated : 2025-10-03 16:58
NVD link : CVE-2025-57396
Mitre link : CVE-2025-57396
CVE.ORG link : CVE-2025-57396
JSON object : View
Products Affected
                tandoor
- recipes
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
