Cyber Posture

CVE-2026-27603

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0009 26.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27603 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Depomo Chartbrew. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authentication on a public-facing web app endpoint (POST /project/:project_id/chart/:chart_id/filter) directly enables remote unauthenticated exploitation to access arbitrary chart data, matching T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the chart filter endpoint POST /project/:project_id/chart/:chart_id/filter is missing both verifyToken and checkPermissions middleware, allowing unauthenticated…

more

users to access chart data from any team/project. This issue has been patched in version 4.8.4.

Deeper analysisAI

CVE-2026-27603 is a missing authentication vulnerability in Chartbrew, an open-source web application that connects directly to databases and APIs to create charts from data. In versions prior to 4.8.4, the POST /project/:project_id/chart/:chart_id/filter endpoint lacks both verifyToken and checkPermissions middleware. This flaw allows unauthenticated users to access chart data from any team or project. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-306 (Missing Authentication for Critical Function).

Unauthenticated attackers with network access can exploit this issue remotely with low complexity and no user interaction required. By sending a POST request to the vulnerable endpoint with arbitrary project_id and chart_id values, attackers can retrieve chart data from any project, potentially exposing sensitive information visualized in those charts, such as database query results or API-derived insights.

Chartbrew has patched this vulnerability in version 4.8.4. Administrators should upgrade to this version or later to mitigate the issue. Additional details are available in the GitHub security advisory at https://github.com/chartbrew/chartbrew/security/advisories/GHSA-9fhr-5vvc-p455 and the release notes at https://github.com/chartbrew/chartbrew/releases/tag/v4.8.4.

Details

CWE(s)

Affected Products

depomo
chartbrew
≤ 4.8.4

CVEs Like This One

CVE-2026-25888Same product: Depomo Chartbrew
CVE-2026-32252Same product: Depomo Chartbrew
CVE-2026-25887Same product: Depomo Chartbrew
CVE-2026-27005Same product: Depomo Chartbrew
CVE-2026-30232Same product: Depomo Chartbrew
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306

References