CVE-2026-27460
Received Received - Intake
Denial of Service in Tandoor Recipes Import via ZIP Bomb

Publication date: 2026-04-10

Last updated on: 2026-04-14

Assigner: GitHub, Inc.

Description
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.5, a critical Denial of Service (DoS) vulnerability was in the recipe import functionality. This vulnerability allows an authenticated user to crash the server or make a significantly degrade its performance by uploading a large size ZIP file (ZIP Bomb). This vulnerability is fixed in 2.6.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tandoor recipes to 2.6.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-409 The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27460 is a Denial of Service (DoS) vulnerability in the Tandoor Recipes application versions prior to 2.6.5, specifically in the recipe import functionality.

The vulnerability occurs because the application extracts files from uploaded ZIP archives directly into memory without validating the uncompressed size, allowing an authenticated user to upload a specially crafted ZIP bomb.

A ZIP bomb is a small compressed file that decompresses into an extremely large payload, causing excessive memory consumption.

This can cause the server process to spike memory usage dramatically, exhausting system resources, degrading performance, or causing the operating system to terminate the application process, resulting in a denial of service.

  • Requires only an authenticated user account with file upload capability.
  • No file size or decompressed size validation is performed on ZIP uploads.
  • The compression ratio exploited can exceed 1,000:1, turning a small upload (~20MB) into tens of gigabytes in memory.
  • The vulnerability was fixed in version 2.6.5 by adding validation or limiting decompression size.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can severely impact the availability and performance of the Tandoor Recipes server.

An attacker with a standard authenticated user account can upload a malicious ZIP bomb that causes excessive memory consumption, leading to resource exhaustion.

The consequences include severe performance degradation, potential swapping, or the operating system's Out of Memory (OOM) killer terminating the application process.

This results in a denial of service, making the application unavailable to legitimate users.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unusually high memory usage spikes on the server process handling recipe imports, especially Gunicorn worker processes running inside Docker containers.

Since the attack involves uploading a specially crafted ZIP file (ZIP bomb) to the /recipe/import endpoint, detection can include inspecting incoming file uploads for unusually high compression ratios or large decompressed sizes.

Commands to help detect this condition include monitoring memory usage of the application process, for example:

  • Use `top` or `htop` to observe memory consumption spikes of Gunicorn worker processes.
  • Use `docker stats <container_id>` to monitor container memory usage in real time.
  • Use `ps aux --sort=-%mem | head` to identify processes consuming the most memory.

Additionally, inspecting web server or application logs for repeated large file uploads to the /recipe/import endpoint by authenticated users may help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Tandoor Recipes to version 2.6.5 or later, where this vulnerability has been fixed by adding validation or limiting decompression size to prevent resource exhaustion.

Until the upgrade can be performed, consider implementing the following temporary mitigations:

  • Restrict or disable the recipe import functionality for authenticated users if possible.
  • Implement network-level controls such as rate limiting or file size restrictions on uploads to the /recipe/import endpoint.
  • Monitor system memory usage closely and configure alerts for abnormal spikes.
  • Use web application firewall (WAF) rules to detect and block suspicious ZIP file uploads with unusually high compression ratios.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart