Chartbrew CVE-2026-40600: Cross-Project SharePolicy Manipulation

Chartbrew CVE-2026-40600: Cross-Project SharePolicy Manipulation

The National Vulnerability Database has detailed CVE-2026-40600, a high-severity vulnerability (CVSS 8.1) impacting Chartbrew, an open-source web application for data visualization. This flaw, present in version 4.9.0, allows authenticated users with access to a single project to modify or delete SharePolicy records belonging to other projects. The underlying issue is an authorization bypass: the affected routes validate the project ID in the URL path but fail to verify if the policy_id actually belongs to that project.

This vulnerability enables unauthorized manipulation of dashboard sharing rules across projects. An attacker could alter visibility settings, password requirements, allowed parameters, and expiration dates for dashboards they shouldn’t have access to. This is a critical control bypass, as it directly undermines data isolation and access controls within multi-tenant or multi-project Chartbrew deployments. It’s not just about viewing data; it’s about controlling who else can see it and under what conditions.

Chartbrew has patched this issue in version 5.0.0. Defenders using Chartbrew must understand that this isn’t a theoretical risk; it’s a practical attack vector for lateral movement and data exposure between projects, even if the initial compromise is limited to a single project’s credentials. The attacker’s calculus here is clear: leverage a low-privilege credential to gain broader control over data sharing configurations, potentially exposing sensitive dashboards to unintended recipients.

What This Means For You

  • If your organization uses Chartbrew, immediately verify your version. If you are running version 4.9.0 or earlier, upgrade to version 5.0.0 without delay to mitigate CVE-2026-40600. After patching, audit your `SharePolicy` configurations across all projects to ensure no unauthorized modifications occurred prior to the update. This vulnerability allows authenticated users to alter sharing rules, so a compromised user account could have already exposed sensitive dashboards.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1531 Impact

CVE-2026-40600: Chartbrew Cross-Project SharePolicy Manipulation (Free Tier)

Sigma YAML — free preview
title: CVE-2026-40600: Chartbrew Cross-Project SharePolicy Manipulation (Free Tier)
id: scw-2026-04-30-ai-1
status: experimental
level: high
description: |
  Detects attempts to modify or delete SharePolicy records in Chartbrew by targeting routes that include both '/projects/' and '/share-policy/'. This rule specifically targets the vulnerability CVE-2026-40600 where authenticated users can manipulate sharing rules of projects they do not own due to insufficient authorization checks on the policy_id belonging to the project in the URL path. This is a high-impact detection for the free tier.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-40600/
tags:
  - attack.impact
  - attack.t1531
logsource:
    category: webserver
detection:
  selection:
      cs-method:
          - 'PUT'
          - 'DELETE'
      cs-uri-query|contains:
          - '/share-policy/'
      cs-uri|contains:
          - '/projects/'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40600 Auth Bypass Chartbrew version 4.9.0
CVE-2026-40600 Auth Bypass Cross-project modification of SharePolicy records
CVE-2026-40600 Auth Bypass Vulnerable component: SharePolicy update/delete routes
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 30, 2026 at 22:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7429 — The STL Processing Endpoint That Cross-Site Scripting (XSS)

CVE-2026-7429 — SSCMS v7.4.0 contains a reflected cross-site scripting vulnerability in the STL processing endpoint that allows attackers to execute arbitrary JavaScript by crafting malicious...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /4.6 /⚑ 2 IOCs /⚙ 3 Sigma
Featured

Daily Security Digest — 2026-04-30

20 vulnerability disclosures (3 Critical, 17 High) and 16 curated intelligence stories from 5 sources.

daily-digestvulnerabilityCVEhigh-severityout-of-bounds-1cwe-125path-traversalcwe-23null-pointer-dereferencecwe-476
/SCW Daily Digest /CRITICAL

CVE-2026-7461: Amazon ECS Agent Vulnerability Allows SYSTEM Privilege Escalation

CVE-2026-7461 — Improper neutralization of inputs used in an OS command in the FSx Windows File Server volume mounting component in Amazon ECS Agent on...

vulnerabilityCVEhigh-severitycwe-78
/SCW Vulnerability Desk /HIGH /7.2 /⚑ 4 IOCs /⚙ 3 Sigma