Impact
Chartbrew exposes a POST endpoint that triggers a data refresh for a chart without requiring authentication. An attacker who can determine a chart identifier can use this to view the current data of private charts, effectively exfiltrating confidential information. The weakness is a missing authorization control, classified as CWE‑862.
Affected Systems
The vulnerability affects Chartbrew version 4.9.0. It was fixed in version 5.0.0. All deployments of the 4.9.x series that include the /api/chart/:chart_id/query endpoint are potentially exploitable.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. No EPSS score is published, and the issue is not listed in CISA KEV. The attack path is a remote HTTP POST to /api/chart/:chart_id/query; an attacker only needs a valid chart ID, which may be discovered through enumeration or public references. Since authentication is not enforced, the vulnerability can be exploited from any network that can reach the API endpoint.
OpenCVE Enrichment