Description
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, Chartbrew exposes public chart retrieval and export routes that only verify project-level public access and, for exports, a team-level export toggle. The routes do not verify whether the target chart is actually allowed on the public report or whether the governing SharePolicy permits public access. An unauthenticated attacker who knows a chart identifier in a public project can read or export chart data for charts that were intentionally hidden from the report. This issue has been patched in version 5.0.0.
Published: 2026-04-30
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Chartbrew is an open‑source analytics platform that allows users to connect databases and APIs to generate charts. In version 4.9.0 the API exposed public chart retrieval and export endpoints that only checked whether the enclosing project was marked public, and for exports verified a generic team‑level toggle. However, the endpoints failed to confirm whether the individual chart was intended for public display or whether the SharePolicy explicitly granted public access. As a result, an attacker, even without authentication, could supply a known chart identifier and read or download chart data that should have remained hidden. The weakness is an improper access control flaw (CWE‑284) that leads to unauthorized disclosure of chart data.

Affected Systems

Chartbrew’s open‑source web application. The vulnerability exists in any GitHub project using Chartbrew version 4.9.0 or earlier. It was resolved in the subsequent release, version 5.0.0.

Risk and Exploitability

The CVSS score of 7.5 indicates a high‑severity risk. The lack of an EPSS score means no published probability estimate is available, but the vulnerability was publicly disclosed and has been addressed by the vendor. The issue can be exploited simply by sending HTTP requests to the public chart or export endpoints with a guessed chart identifier, which is feasible for an unauthenticated attacker. Because the flaw resides in the back‑end logic and does not require privileged user credentials, the likely attack vector is remote network access over HTTP/HTTPS. The vulnerability has not been listed in the CISA KEV catalog, yet its high impact and ease of exploitation warrant immediate remediation if the affected version is in use.

Generated by OpenCVE AI on May 1, 2026 at 05:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Chartbrew installation to version 5.0.0 or later, which fixes the missing access checks on the public chart and export routes.
  • After the upgrade, review the SharePolicy configuration for each chart to ensure that sensitive charts are not accidentally set to public.
  • Audit the chart visibility settings of existing public projects and adjust the public‑report flags to match intended disclosure levels.

Generated by OpenCVE AI on May 1, 2026 at 05:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Chartbrew
Chartbrew chartbrew
Vendors & Products Chartbrew
Chartbrew chartbrew

Thu, 30 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, Chartbrew exposes public chart retrieval and export routes that only verify project-level public access and, for exports, a team-level export toggle. The routes do not verify whether the target chart is actually allowed on the public report or whether the governing SharePolicy permits public access. An unauthenticated attacker who knows a chart identifier in a public project can read or export chart data for charts that were intentionally hidden from the report. This issue has been patched in version 5.0.0.
Title Chartbrew: Incorrect Access Control in public chart and export routes via missing onReport and SharePolicy checks
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Chartbrew Chartbrew
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-30T19:02:16.378Z

Reserved: 2026-04-14T14:07:59.641Z

Link: CVE-2026-40595

cve-icon Vulnrichment

Updated: 2026-04-30T19:01:52.730Z

cve-icon NVD

Status : Deferred

Published: 2026-04-30T19:16:09.783

Modified: 2026-05-01T15:31:02.467

Link: CVE-2026-40595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T05:15:09Z

Weaknesses