Chartbrew CVE-2026-40601: Unauthenticated Data Exposure
The National Vulnerability Database (NVD) reports a critical vulnerability, CVE-2026-40601, in Chartbrew, an open-source web application designed for data visualization. Affecting version 4.9.0, this flaw allows an unauthenticated attacker to trigger a data refresh and retrieve sensitive information from private charts. The issue stems from the POST /api/chart/:chart_id/query endpoint failing to properly verify if a target chart belongs to a public report or if sharing policies permit the operation.
Specifically, the NVD notes that the endpoint only checks team.allowReportRefresh, bypassing crucial authentication and authorization checks. An attacker only needs to know a chart identifier to exploit this, making it a straightforward path to data exfiltration. The CVSS score of 7.5 (High) reflects the severity, with a vector indicating network-based attack, low complexity, no privileges required, and high confidentiality impact.
This vulnerability fundamentally undermines the confidentiality of data managed by Chartbrew instances. Organizations using Chartbrew for internal dashboards or client reporting could inadvertently expose sensitive business metrics, operational data, or even customer information. Defenders need to recognize that this isn’t just a theoretical risk; it’s a direct route for any attacker with basic reconnaissance capabilities to pull private data without authentication.
What This Means For You
- If your organization uses Chartbrew, immediately verify your version. If you are running version 4.9.0 or earlier, you are directly exposed to CVE-2026-40601. Patch to version 5.0.0 or later without delay. Prioritize this fix, as an unauthenticated attacker can retrieve private chart data with minimal effort.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Chartbrew Unauthenticated Chart Data Exposure via POST /api/chart/:chart_id/query - CVE-2026-40601
title: Chartbrew Unauthenticated Chart Data Exposure via POST /api/chart/:chart_id/query - CVE-2026-40601
id: scw-2026-04-30-ai-1
status: experimental
level: high
description: |
Detects unauthenticated POST requests to the /api/chart/:chart_id/query endpoint in Chartbrew versions prior to 5.0.0. This specific endpoint was vulnerable to unauthenticated data exposure as it did not properly check authorization before refreshing and returning chart data, allowing attackers to access private chart data.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-40601/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-method:
- 'POST'
cs-uri|contains:
- '/api/chart/'
- '/query'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40601 | Information Disclosure | Chartbrew versions < 5.0.0 |
| CVE-2026-40601 | Auth Bypass | Chartbrew POST /api/chart/:chart_id/query endpoint |
| CVE-2026-40601 | Information Disclosure | Unauthenticated access to private chart data via POST /api/chart/:chart_id/query in Chartbrew |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 30, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.