<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chartbrew — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/chartbrew/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 20:16:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/chartbrew/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chartbrew Cross-Tenant Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chartbrew-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 20:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chartbrew-auth-bypass/</guid><description>Chartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.</description><content:encoded><![CDATA[<p>Chartbrew, an open-source web application used for creating charts from databases and APIs, is vulnerable to a cross-tenant authorization bypass (CVE-2026-32252) in versions prior to 4.9.0. This vulnerability resides in the GET /team/:team_id/template/generate/:project_id endpoint. Specifically, the <code>checkAccess</code> function doesn&rsquo;t await its promise and fails to validate if the <code>project_id</code> belongs to the specified <code>team_id</code> or the attacker&rsquo;s team. This allows an authenticated attacker with template generation permissions in their own team to request and receive template model data for projects belonging to other teams. Upgrading to version 4.9.0 or later resolves this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a Chartbrew instance with valid credentials and template generation permissions within their own team.</li>
<li>Attacker identifies a valid <code>team_id</code> belonging to a victim team. This could be done through enumeration of team IDs, social engineering, or other means.</li>
<li>Attacker identifies a valid <code>project_id</code> belonging to the victim team. This may require some level of prior knowledge or reconnaissance.</li>
<li>Attacker crafts a GET request to <code>/team/:victim_team_id/template/generate/:victim_project_id</code>, replacing <code>:victim_team_id</code> and <code>:victim_project_id</code> with the identified values.</li>
<li>The Chartbrew server receives the request and calls the <code>checkAccess</code> function, but does not await the promise.</li>
<li>Due to the missing validation of the <code>project_id</code> against the <code>team_id</code> and the caller&rsquo;s team, the authorization check is bypassed.</li>
<li>The server retrieves the template model data associated with the victim&rsquo;s project.</li>
<li>The server returns the victim&rsquo;s project data to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain unauthorized access to sensitive project data belonging to other teams within the Chartbrew application. This could include confidential database connection strings, API keys, data schemas, and other information that could be used to further compromise the victim&rsquo;s systems or data. The number of affected organizations depends on the adoption rate of Chartbrew instances prior to version 4.9.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chartbrew to version 4.9.0 or later to patch CVE-2026-32252.</li>
<li>Implement the Sigma rule <code>Detect Chartbrew Template Generation Request</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for unusual requests to the <code>/team/*/template/generate/*</code> endpoint using a WAF or similar tool.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chartbrew</category><category>authorization-bypass</category><category>web-application</category></item></channel></rss>