CVE-2026-27605
Received Received - Intake
Stored XSS in Chartbrew File Upload Enables Account Takeover

Publication date: 2026-03-06

Last updated on: 2026-03-10

Assigner: GitHub, Inc.

Description
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the application allows uploading files (project logos) without validating the file type or content. It trusts the extension provided by the user. These files are saved to the uploads/ directory and served statically. An attacker can upload an HTML file containing malicious JavaScript. Since authentication tokens are likely stored in localStorage (as they are returned in the API body), this XSS can lead to account takeover. This issue has been patched in version 4.8.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
depomo chartbrew to 4.8.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-27605 is a stored Cross-Site Scripting (XSS) vulnerability in the Chartbrew web application versions prior to 4.8.4. The application allows users to upload files, such as project logos, without validating the actual file type or content, relying only on the file extension provided by the user.'}, {'type': 'paragraph', 'content': "Because these files are saved in the uploads/ directory and served statically, an attacker can upload a malicious HTML file containing JavaScript code. When this file is accessed, the malicious script executes in the victim's browser under the application's domain."}, {'type': 'paragraph', 'content': 'Since authentication tokens are likely stored in localStorage and returned in the API response body, the malicious script can steal these tokens, potentially leading to account takeover.'}] [1]


How can this vulnerability impact me? :

This vulnerability can have several impacts on users and administrators of the Chartbrew application.

  • An attacker can steal authentication tokens or cookies, leading to account takeover.
  • The attacker can deface content within the application.
  • Keylogging can be performed to capture sensitive user input.
  • Phishing forms can be injected to trick users into revealing sensitive information.
  • Users can be redirected to malicious websites.

Additionally, the attack does not require the victim to be authenticated to trigger the XSS payload, increasing the risk and attack surface.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the application allows uploading files without validating their type or content, especially if files are saved in the uploads/ directory and served statically.'}, {'type': 'paragraph', 'content': 'One approach is to look for suspicious HTML or JavaScript files in the uploads/ directory that could contain malicious scripts.'}, {'type': 'paragraph', 'content': 'You can also monitor HTTP requests to the uploads/ directory for files with unexpected extensions or content.'}, {'type': 'list_item', 'content': 'Use a command to list files in the uploads directory, for example: ls -l /path/to/chartbrew/uploads/'}, {'type': 'list_item', 'content': 'Use curl or wget to fetch files from the uploads directory and inspect their content, e.g.: curl http://your-chartbrew-instance/uploads/suspicious-file.html'}, {'type': 'list_item', 'content': "Search for HTML or JavaScript content in the uploads directory using grep, e.g.: grep -r '<script' /path/to/chartbrew/uploads/"}, {'type': 'paragraph', 'content': 'Additionally, reviewing application logs for file upload activities and inspecting the file extensions and contents can help detect exploitation attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade Chartbrew to version 4.8.4 or later, where the issue has been patched.

Until the upgrade can be applied, restrict file uploads to only allow safe file types and implement server-side validation to verify file content, not just the extension.

Additionally, consider restricting access to the uploads/ directory or serving uploaded files in a way that prevents execution of scripts.

Monitor and remove any suspicious files found in the uploads/ directory that could contain malicious scripts.

Inform users about the risk and encourage them to be cautious with files uploaded to the application.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart