CVE-2026-32252

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project_id. The GET handler calls checkAccess(req, "updateAny", "chart") without awaiting the returned promise, and it does not verify that the supplied project_id belongs to req.params.team_id or to the caller's team. As a result, an authenticated attacker with valid template-generation permissions in their own team can request the template model for a project belonging to another team and receive victim project data. This vulnerability is fixed in 4.9.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:depomo:chartbrew:*:*:*:*:*:*:*:*

History

14 Apr 2026, 17:25

Type Values Removed Values Added
CPE cpe:2.3:a:depomo:chartbrew:*:*:*:*:*:*:*:*
First Time Depomo chartbrew
Depomo
References () https://github.com/chartbrew/chartbrew/commit/bf5919043d3587fcbe76123aaabd9a0a9d1033f1 - () https://github.com/chartbrew/chartbrew/commit/bf5919043d3587fcbe76123aaabd9a0a9d1033f1 - Patch
References () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj - () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj - Exploit, Mitigation, Vendor Advisory

13 Apr 2026, 16:16

Type Values Removed Values Added
References () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj - () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj -

10 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 20:16

Updated : 2026-04-14 17:25


NVD link : CVE-2026-32252

Mitre link : CVE-2026-32252

CVE.ORG link : CVE-2026-32252


JSON object : View

Products Affected

depomo

  • chartbrew
CWE
CWE-285

Improper Authorization