Ad

CVE-2026-35046

MEDIUM CVSS 3.1: 5.4 EPSS 0.03%
Updated Apr 10, 2026
Tandoor
Parameter Value
CVSS 5.4 (MEDIUM)
Affected Versions before 2.6.4
Fixed In 2.6.4
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor Tandoor
Public PoC No

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, Tandoor Recipes allows authenticated users to inject arbitrary <style> tags into recipe step instructions. The bleach.clean() sanitizer explicitly whitelists the <style> tag, causing the backend to persist and serve unsanitized CSS payloads via the API.

Any client consuming instructions_markdown from the API and rendering it as HTML without additional sanitization will execute attacker-controlled CSS — enabling UI redressing, phishing overlays, visual defacement, and CSS-based data exfiltration. This vulnerability is fixed in 2.6.4.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Tandoor Recipes
cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*
2.6.4