Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project_id. The GET handler calls checkAccess(req, "updateAny", "chart") without awaiting the returned promise, and it does not verify that the supplied project_id belongs to req.params.team_id or to the caller's team. As a result, an authenticated attacker with valid template-generation permissions in their own team can request the template model for a project belonging to another team and receive victim project data. This vulnerability is fixed in 4.9.0.
References
| Link | Resource |
|---|---|
| https://github.com/chartbrew/chartbrew/commit/bf5919043d3587fcbe76123aaabd9a0a9d1033f1 | Patch |
| https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj | Exploit Mitigation Vendor Advisory |
| https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj | Exploit Mitigation Vendor Advisory |
Configurations
History
14 Apr 2026, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:depomo:chartbrew:*:*:*:*:*:*:*:* | |
| First Time |
Depomo chartbrew
Depomo |
|
| References | () https://github.com/chartbrew/chartbrew/commit/bf5919043d3587fcbe76123aaabd9a0a9d1033f1 - Patch | |
| References | () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj - Exploit, Mitigation, Vendor Advisory |
13 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-mw4f-cf22-qpcj - |
10 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 20:16
Updated : 2026-04-14 17:25
NVD link : CVE-2026-32252
Mitre link : CVE-2026-32252
CVE.ORG link : CVE-2026-32252
JSON object : View
Products Affected
depomo
- chartbrew
CWE
CWE-285
Improper Authorization
