Impact
Chartbrew has an incorrect access control check in its dataset and dataRequest endpoints, allowing a user with only project-level permissions to reference any dataset or request belonging to other projects within the same team. This weakness can be exploited remotely by an authenticated attacker and enables the attacker to read, execute, create, update, and delete data from other projects. The exploit is based on CWE‑284 (Improper Access Control).
Affected Systems
The vulnerability affects the open‑source application Chartbrew, specifically versions starting with 4.9.0. It has been fixed in release 5.0.0 and later.
Risk and Exploitability
The CVSS score of 8.1 indicates a high severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. The attack requires only ordinary project-level credentials and can be carried out remotely, giving an attacker broad unauthorized access within a team environment.
OpenCVE Enrichment