CVE-2026-33152
Received Received - Intake
Unrestricted Brute-Force in Tandoor Recipes API Authentication

Publication date: 2026-03-26

Last updated on: 2026-03-30

Assigner: GitHub, Inc.

Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-26
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tandoor recipes to 2.6.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-307 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33152 is a critical vulnerability in Tandoor Recipes versions prior to 2.6.0 involving the use of Basic Authentication in the Django REST Framework API without any rate limiting or account lockout protections.

While the HTML login endpoint enforces rate limiting (5 login attempts per minute per IP), this protection does not apply to API endpoints that accept Authorization: Basic headers.

As a result, attackers can perform unlimited, high-speed password guessing attacks (brute-force or dictionary attacks) against any known username via API endpoints without triggering lockouts or throttling.

This allows fully automated credential stuffing and brute-force attacks, making all user accounts vulnerable.

The vulnerability corresponds to CWE-307: Improper Restriction of Excessive Authentication Attempts and was fixed in version 2.6.0 by adding appropriate rate limiting or throttling to API authentication.


How can this vulnerability impact me? :

This vulnerability allows attackers to perform unlimited automated password guessing attacks against any known username on Tandoor Recipes API endpoints.

  • Attackers can execute high-speed brute-force or dictionary attacks without any rate limiting or account lockout.
  • Credential stuffing attacks using leaked credentials are possible.
  • User accounts can be compromised due to the lack of throttling and lockout mechanisms.
  • Confidentiality and integrity of user data are at high risk.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the API endpoints of Tandoor Recipes for Basic Authentication without rate limiting or account lockout.

A proof of concept involves sending multiple rapid authentication attempts with incorrect passwords to an API endpoint that accepts Authorization: Basic headers and observing the responses.

  • Use curl or similar tools to send repeated requests with Basic Authentication headers to an API endpoint.
  • Example command to test failed attempts (replace USERNAME, PASSWORD, and API_URL accordingly):
  • for i in {1..20}; do curl -i -u USERNAME:PASSWORD -X GET https://API_URL/api/endpoint/; done

If all failed attempts return HTTP 403 without any HTTP 429 (Too Many Requests) or account lockout, it indicates no rate limiting is applied.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Tandoor Recipes to version 2.6.0 or later, where the vulnerability has been patched.

The patch presumably adds appropriate rate limiting or throttling to API authentication endpoints to prevent unlimited brute-force attempts.

If upgrading is not immediately possible, consider implementing additional rate limiting or throttling mechanisms on the API endpoints that accept Basic Authentication headers.

Also, monitor authentication attempts and consider blocking IPs with suspiciously high failed login rates.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to perform high-speed brute-force attacks on user accounts without any rate limiting or account lockout, potentially leading to unauthorized access to sensitive user data.

Such unauthorized access risks violating common standards and regulations like GDPR and HIPAA, which require protecting personal and sensitive information against unauthorized access and ensuring appropriate security controls are in place.

The lack of throttling or lockout mechanisms on API authentication endpoints increases the risk of credential stuffing and account compromise, which could lead to data breaches and non-compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart