Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-23838

Tandoor Recipes module allows SQLite database to be externally accessible with the default settings
Back to all
CVE

CVE-2026-23838

Tandoor Recipes module allows SQLite database to be externally accessible with the default settings

Tandoor Recipes is a recipe manager than can be installed with the Nix package manager. Starting in version 23.05 and prior to version 26.05, when using the default configuration of Tandoor Recipes, specifically using SQLite and default MEDIA_ROOT, the full database file may be externally accessible, potentially on the Internet. The root cause is that the NixOS module configures the working directory of Tandoor Recipes, as well as the value of MEDIA_ROOT, to be /var/lib/tandoor-recipes. This causes Tandoor Recipes to create its db.sqlite3 database file in the same directory as MEDIA_ROOT causing it to be accessible without authentication through HTTP like any other media file. This is the case when using GUNICORN_MEDIA=1 or when using a web server like nginx to serve media files. NixOS 26.05 changes the default value of MEDIA_ROOT to a sub folder of the data directory. This only applies to configurations with system.stateVersion >= 26.05. For older configurations, one of the workarounds should be applied instead. NixOS 25.11 has received a backport of this patch, though it doesn't fix this vulnerability without user intervention. A recommended workaround is to move MEDIA_ROOT into a subdirectory. Non-recommended workarounds include switching to PostgreSQL or disallowing access to db.sqlite3.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.7
-
4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23838.json, https://github.com/NixOS/nixpkgs/issues/338339, https://github.com/NixOS/nixpkgs/pull/427845, https://github.com/NixOS/nixpkgs/pull/481140, https://github.com/NixOS/nixpkgs/security/advisories/GHSA-g8w3-p77x-mmxh, https://nvd.nist.gov/vuln/detail/CVE-2026-23838

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00133%
EPSS Percentile
0.32809%
Introduced Version
b68bd2ee52051aaf983a268494cb4fc6c485b646
Fix Available
2493002b10ccef0880f72d7720538f91fb4f7434

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading