Chartbrew

8 CVEs product

Monthly

CVE-2026-32252 HIGH This Week

Cross-tenant authorization bypass in Chartbrew versions prior to 4.9.0 allows authenticated attackers to exfiltrate sensitive project data from other tenants. The vulnerability exists in the template generation endpoint (GET /team/:team_id/template/generate/:project_id), where unawaited promise execution and missing tenant validation enable attackers with valid template-generation permissions in their own team to access chart configurations, database connection details, and query structures from victim teams' projects. No public exploit identified at time of analysis. CVSS 7.7 reflects high confidentiality impact with scope change due to cross-tenant boundary violation.

Authentication Bypass Chartbrew
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-30232 HIGH This Week

Server-Side Request Forgery in Chartbrew versions prior to 4.8.5 allows authenticated users to create API data connections with arbitrary URLs, enabling attacks against internal networks and cloud metadata endpoints. The vulnerability stems from unvalidated URL fetching via request-promise library, permitting attackers to probe internal infrastructure, access cloud instance metadata (AWS, Azure, GCP), and potentially retrieve sensitive credentials or configuration data. No public exploit identified at time of analysis. CVSS 7.8 with network attack vector and no authentication requirement in subsequent chain exploitation.

SSRF Chartbrew
NVD GitHub
CVSS 4.0
7.8
EPSS
0.0%
CVE-2026-27605 MEDIUM POC This Month

Chartbrew versions prior to 4.8.4 allow authenticated users to upload arbitrary files by bypassing file type validation, enabling stored XSS attacks through malicious HTML files served from the uploads directory. An attacker can exploit this to steal authentication tokens stored in localStorage and achieve account takeover. Public exploit code exists for this vulnerability, and no patch is currently available.

XSS Chartbrew
NVD GitHub
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-27603 HIGH POC This Week

Chartbrew versions up to 4.8.4 is affected by missing authentication for critical function (CVSS 7.5).

Authentication Bypass Chartbrew
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27005 CRITICAL POC Act Now

SQL injection in Chartbrew before 4.8.3. PoC available.

MySQL PostgreSQL Chartbrew
NVD GitHub
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-25888 HIGH POC This Week

Remote code execution in Chartbrew prior to version 4.8.1 allows authenticated attackers to execute arbitrary code through a vulnerable API endpoint. Public exploit code exists for this vulnerability, and no patch is currently available. Attackers with valid credentials can achieve full system compromise including data exfiltration and integrity violations.

RCE Chartbrew
NVD GitHub
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-25887 HIGH POC This Week

Remote code execution in Chartbrew versions prior to 4.8.1 allows authenticated attackers with high privileges to execute arbitrary code through malicious MongoDB dataset queries. The vulnerability affects users connecting Chartbrew to MongoDB databases for chart creation and has active public exploit code available. No patch is currently available for affected versions.

MongoDB RCE Chartbrew
NVD GitHub
CVSS 3.1
7.2
EPSS
0.4%
CVE-2026-25877 MEDIUM POC This Month

Chartbrew versions before 4.8.1 fail to validate chart ownership during modification operations, allowing authenticated users to read, modify, or delete charts from other projects they shouldn't access. An attacker with valid credentials to any project can exploit this authorization bypass to manipulate arbitrary charts across the application. Public exploit code exists for this vulnerability, and no patch is currently available.

Authentication Bypass Chartbrew
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-32252
EPSS 0% CVSS 7.7
HIGH This Week

Cross-tenant authorization bypass in Chartbrew versions prior to 4.9.0 allows authenticated attackers to exfiltrate sensitive project data from other tenants. The vulnerability exists in the template generation endpoint (GET /team/:team_id/template/generate/:project_id), where unawaited promise execution and missing tenant validation enable attackers with valid template-generation permissions in their own team to access chart configurations, database connection details, and query structures from victim teams' projects. No public exploit identified at time of analysis. CVSS 7.7 reflects high confidentiality impact with scope change due to cross-tenant boundary violation.

Authentication Bypass Chartbrew
NVD GitHub
CVE-2026-30232
EPSS 0% CVSS 7.8
HIGH This Week

Server-Side Request Forgery in Chartbrew versions prior to 4.8.5 allows authenticated users to create API data connections with arbitrary URLs, enabling attacks against internal networks and cloud metadata endpoints. The vulnerability stems from unvalidated URL fetching via request-promise library, permitting attackers to probe internal infrastructure, access cloud instance metadata (AWS, Azure, GCP), and potentially retrieve sensitive credentials or configuration data. No public exploit identified at time of analysis. CVSS 7.8 with network attack vector and no authentication requirement in subsequent chain exploitation.

SSRF Chartbrew
NVD GitHub
CVE-2026-27605
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Chartbrew versions prior to 4.8.4 allow authenticated users to upload arbitrary files by bypassing file type validation, enabling stored XSS attacks through malicious HTML files served from the uploads directory. An attacker can exploit this to steal authentication tokens stored in localStorage and achieve account takeover. Public exploit code exists for this vulnerability, and no patch is currently available.

XSS Chartbrew
NVD GitHub
CVE-2026-27603
EPSS 0% CVSS 7.5
HIGH POC This Week

Chartbrew versions up to 4.8.4 is affected by missing authentication for critical function (CVSS 7.5).

Authentication Bypass Chartbrew
NVD GitHub
CVE-2026-27005
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

SQL injection in Chartbrew before 4.8.3. PoC available.

MySQL PostgreSQL Chartbrew
NVD GitHub
CVE-2026-25888
EPSS 0% CVSS 8.8
HIGH POC This Week

Remote code execution in Chartbrew prior to version 4.8.1 allows authenticated attackers to execute arbitrary code through a vulnerable API endpoint. Public exploit code exists for this vulnerability, and no patch is currently available. Attackers with valid credentials can achieve full system compromise including data exfiltration and integrity violations.

RCE Chartbrew
NVD GitHub
CVE-2026-25887
EPSS 0% CVSS 7.2
HIGH POC This Week

Remote code execution in Chartbrew versions prior to 4.8.1 allows authenticated attackers with high privileges to execute arbitrary code through malicious MongoDB dataset queries. The vulnerability affects users connecting Chartbrew to MongoDB databases for chart creation and has active public exploit code available. No patch is currently available for affected versions.

MongoDB RCE Chartbrew
NVD GitHub
CVE-2026-25877
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Chartbrew versions before 4.8.1 fail to validate chart ownership during modification operations, allowing authenticated users to read, modify, or delete charts from other projects they shouldn't access. An attacker with valid credentials to any project can exploit this authorization bypass to manipulate arbitrary charts across the application. Public exploit code exists for this vulnerability, and no patch is currently available.

Authentication Bypass Chartbrew
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy