Vulnerability Description
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, the endpoint POST /user/invited does not validate any invite token, authentication header, or session. Any unauthenticated attacker can call this endpoint directly to create a fully active account and receive a valid JWT — even when the instance has existing users and signupRestricted is enabled. This bypass is distinct from the normal registration endpoint (POST /user) which enforces signupRestricted and sets active: false pending verification. This issue has been patched in version 5.0.0.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/chartbrew/chartbrew/releases/tag/v5.0.0
- https://github.com/chartbrew/chartbrew/security/advisories/GHSA-g47g-v5cp-j8hp
FAQ
What is CVE-2026-35514?
CVE-2026-35514 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. In version 4.9.0, the endpoint POST /user/invited does not validate any i...
How severe is CVE-2026-35514?
CVE-2026-35514 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35514?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.