Chartbrew CVE-2026-40904 Exposes Cross-Project Data in v4.9.0
A critical authorization flaw, CVE-2026-40904, has been identified in Chartbrew, an open-source web application for data visualization. The National Vulnerability Database reports that Chartbrew version 4.9.0 fails to properly bind dataset, data request, and connection IDs to a user’s permitted projects. Instead, it authorizes low-privileged project members at the broader team level, creating a significant security gap.
This misconfiguration allows an authenticated attacker with access to just one project within a team to gain unauthorized read, execute, create, update, and delete privileges over datasets and data requests belonging to other projects in the same team. The issue is remotely exploitable with standard project-level credentials, according to the National Vulnerability Database. This directly leads to cross-project data disclosure and unauthorized use of victim-side database or API connections.
The vulnerability carries a CVSS score of 8.1 (HIGH) and has been patched in Chartbrew version 5.0.0. Defenders must understand that this isn’t just about data visibility; it’s about control over critical data connections. An attacker could not only steal sensitive information but also manipulate data sources or even pivot to underlying databases through hijacked connections.
What This Means For You
- If your organization uses Chartbrew, immediately check your version. If you are running 4.9.0 or earlier, upgrade to version 5.0.0 without delay. Audit logs for any suspicious activity related to dataset or data request manipulation, especially across different projects within the same team. This vulnerability allows low-privileged users to become high-impact threats, bypassing project-level segmentation that many teams rely on for data isolation.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-40904 - Chartbrew Cross-Project Data Access
title: CVE-2026-40904 - Chartbrew Cross-Project Data Access
id: scw-2026-04-30-ai-1
status: experimental
level: high
description: |
Detects attempts to access dataset or dataRequest endpoints in Chartbrew version 4.9.0. This rule specifically targets the vulnerability where low-privileged users can access data outside their assigned projects by exploiting the lack of proper authorization checks on dataset_id, dataRequest id, and connection_id. This is the primary indicator of the CVE-2026-40904 vulnerability being exploited.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-40904/
tags:
- attack.defense_evasion
- attack.t1078.004
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/v1/datasets/'
- '/api/v1/dataRequests/'
cs-method:
- 'GET'
- 'POST'
- 'PUT'
- 'DELETE'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40904 | Auth Bypass | Chartbrew versions <= 4.9.0 |
| CVE-2026-40904 | Information Disclosure | Chartbrew versions <= 4.9.0, vulnerable endpoints: dataset, dataRequest |
| CVE-2026-40904 | Privilege Escalation | Chartbrew versions <= 4.9.0, allows low-privileged project members to access other projects' data |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 30, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.