Description
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, Chartbrew exposes a legacy dashboard route that returns a project's report data to any authenticated member of the same team, even when that user does not have access to the specific project. The route bypasses project-level authorization and returns the raw project object. As a result, a low-privileged same-team user can read another project's dashboard data and recover the project's stored report password from the response. This issue has been patched in version 5.0.0.
Published: 2026-04-30
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability lies in an unauthorized access path that allows any authenticated member of a team to read dashboards of projects they are not granted explicit project‑level permissions for. This access bypasses normal authorization checks and exposes the raw project object, which can contain sensitive data such as stored report passwords. The flaw is a classic example of improper authorization (CWE-284), allowing a low‑privileged user to gain confidentiality information that should be restricted.

Affected Systems

The affected product is Chartbrew, the open‑source dashboard platform. Versions prior to the 5.0.0 release, including 4.9.0, contain the flaw. The issue was fixed in Chartbrew version 5.0.0, which removes the obsolete route and enforces proper project‑level checks.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS score is not reported, and the vulnerability is not listed in the CISA KEV catalog. The attack can be executed by any authenticated user who shares a team with the targeted project, making the exploitable condition fairly common within internal teams. An attacker only needs to know the route pattern, send a request, and then capture the response that contains the sensitive project data.

Generated by OpenCVE AI on May 1, 2026 at 05:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chartbrew to version 5.0.0 or newer to apply the vendor fix.
  • Verify that the legacy dashboard route has been disabled and that project‑level access controls are enforced for all API endpoints.
  • Audit and monitor API activity for unexpected access patterns, especially from users who are not owners of the accessed projects.

Generated by OpenCVE AI on May 1, 2026 at 05:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Chartbrew
Chartbrew chartbrew
Vendors & Products Chartbrew
Chartbrew chartbrew

Thu, 30 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, Chartbrew exposes a legacy dashboard route that returns a project's report data to any authenticated member of the same team, even when that user does not have access to the specific project. The route bypasses project-level authorization and returns the raw project object. As a result, a low-privileged same-team user can read another project's dashboard data and recover the project's stored report password from the response. This issue has been patched in version 5.0.0.
Title Chartbrew: Incorrect Access Control in /api/project/dashboard/:brewName via same-team override
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Chartbrew Chartbrew
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-30T19:04:07.506Z

Reserved: 2026-04-14T14:07:59.641Z

Link: CVE-2026-40603

cve-icon Vulnrichment

Updated: 2026-04-30T19:04:04.528Z

cve-icon NVD

Status : Deferred

Published: 2026-04-30T19:16:10.253

Modified: 2026-05-01T15:31:02.467

Link: CVE-2026-40603

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T05:15:09Z

Weaknesses