Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, Chartbrew exposes multiple dataset and dataRequest endpoints that authorize low-privileged project members at the team level instead of binding the requested dataset_id, dataRequest id, and connection_id to the caller's allowed projects. An authenticated attacker who only has access to one project inside a team can read, execute, create, update, and delete datasets and data requests that belong to other projects in the same team. The issue is exploitable remotely with ordinary project-level credentials and leads to cross-project data disclosure and unauthorized use of victim-side database or API connections. This issue has been patched in version 5.0.0.
References
Configurations
No configuration.
History
30 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/chartbrew/chartbrew/security/advisories/GHSA-jq95-gqww-vhm3 - |
30 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-30 19:16
Updated : 2026-05-01 15:31
NVD link : CVE-2026-40904
Mitre link : CVE-2026-40904
CVE.ORG link : CVE-2026-40904
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control
