Description
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, the application performs authorization checks based solely on the project_id parameter when handling chart-related operations (update, delete, etc.). No authorization check is performed against the chart_id itself. This allows an authenticated user who has access to any project to manipulate or access charts belonging to other users/ project. This issue has been patched in version 4.8.1.
Published: 2026-03-06
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access or modification of chart resources via IDOR
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in Chartbrew arises because the application performs authorization checks only on the project_id parameter when handling chart operations such as update and delete. No check is performed against the chart_id itself, allowing an authenticated user who has permission to any project to manipulate or read charts belonging to other projects. The result is a classic Insecure Direct Object Reference that can expose sensitive data, alter or delete chart definitions, and undermine the integrity and confidentiality of the data presented by the application. The CVSS score of 6.5 indicates a moderate severity with non‑negligible impact when exploited.

Affected Systems

All installations of Chartbrew prior to version 4.8.1 are affected. The issue applies to any user who is authenticated and has access to at least one project, regardless of whether the targeted chart belongs to the same project. The affected product is Chartbrew, an open‑source web application that can connect to databases and APIs for chart creation.

Risk and Exploitability

The EPSS score of below 1% suggests that exploitation is unlikely in the near term, and the vulnerability is not listed in CISA’s KEV catalog. However, the CVSS score of 6.5 reflects moderate potential impact, and the attack vector is straightforward: an attacker simply supplies a different chart_id when invoking chart update or delete endpoints. Given that the exploitation requires only an authenticated session, the risk is real for any environment where users have broad project access. The easiest mitigation is to apply the patch released in version 4.8.1; otherwise, reduce risk by tightening access controls on chart endpoints.

Generated by OpenCVE AI on April 16, 2026 at 11:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Chartbrew 4.8.1 release or later to remove the insecure authorization check.
  • Restrict user permissions to a least‑privilege model, ensuring that only project owners or explicitly granted users can perform chart modifications.
  • Review existing user and chart permissions after upgrading; if necessary, revoke or re‑assign chart access for users who should not have visibility into other projects.

Generated by OpenCVE AI on April 16, 2026 at 11:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Depomo
Depomo chartbrew
Weaknesses CWE-639
CPEs cpe:2.3:a:depomo:chartbrew:*:*:*:*:*:*:*:*
Vendors & Products Depomo
Depomo chartbrew

Fri, 06 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Chartbrew
Chartbrew chartbrew
Vendors & Products Chartbrew
Chartbrew chartbrew

Fri, 06 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, the application performs authorization checks based solely on the project_id parameter when handling chart-related operations (update, delete, etc.). No authorization check is performed against the chart_id itself. This allows an authenticated user who has access to any project to manipulate or access charts belonging to other users/ project. This issue has been patched in version 4.8.1.
Title Chartbrew: Insecure Direct Object Reference (IDOR) in Chart Operations
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Chartbrew Chartbrew
Depomo Chartbrew
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:09:00.476Z

Reserved: 2026-02-06T21:08:39.128Z

Link: CVE-2026-25877

cve-icon Vulnrichment

Updated: 2026-03-06T15:50:42.704Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T05:16:28.230

Modified: 2026-03-10T14:09:25.073

Link: CVE-2026-25877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:45:26Z

Weaknesses