Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30944: CWE-639: Authorization Bypass Through User-Controlled Key in withstudiocms studiocms

0
High
VulnerabilityCVE-2026-30944cvecve-2026-30944cwe-639cwe-863
Published: Tue Mar 10 2026 (03/10/2026, 16:48:55 UTC)
Source: CVE Database V5
Vendor/Project: withstudiocms
Product: studiocms

Description

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. This vulnerability is fixed in 0.4.0.

AI-Powered Analysis

AILast updated: 03/10/2026, 17:49:13 UTC

Technical Analysis

StudioCMS is a server-side-rendered, Astro native, headless content management system designed to manage content via API tokens. Prior to version 0.4.0, the API endpoint /studiocms_api/dashboard/api-tokens improperly authorizes requests to generate API tokens. Specifically, any authenticated user with Editor-level privileges or higher can request API tokens on behalf of any other user, including those with owner or admin roles. This occurs because the endpoint fails to validate whether the requesting user is authorized to create tokens for the target user ID, leading to an authorization bypass (CWE-639) and improper authorization (CWE-863). Attackers exploiting this flaw can escalate their privileges to full administrative control by generating tokens that grant them unrestricted access. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The issue was publicly disclosed on March 10, 2026, and fixed in StudioCMS version 0.4.0. No known exploits have been reported in the wild as of now.

Potential Impact

The vulnerability allows attackers with at least Editor-level access to escalate privileges to full administrative control by generating API tokens for any user, including owners and admins. This can lead to complete compromise of the CMS environment, enabling unauthorized data access, modification, or deletion, and potentially disrupting content availability. Organizations relying on StudioCMS for content management risk exposure of sensitive data and loss of operational integrity. The ease of exploitation and the broad scope of affected users make this a critical risk for organizations using vulnerable versions. Attackers can leverage this flaw to bypass security controls, potentially pivot to other internal systems, or deface websites managed by StudioCMS.

Mitigation Recommendations

Upgrade StudioCMS to version 0.4.0 or later, where the authorization checks on the /studiocms_api/dashboard/api-tokens endpoint have been properly implemented. Until upgrading, restrict Editor-level user privileges to trusted personnel only and monitor API token creation logs for suspicious activity. Implement network segmentation and access controls to limit exposure of the CMS API endpoints. Employ Web Application Firewalls (WAFs) with custom rules to detect and block anomalous API token generation requests. Conduct regular audits of user roles and API tokens to identify unauthorized privilege escalations. Additionally, consider implementing multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of compromised credentials being exploited.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.979Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05635ea502d3aa87d7bfb

Added to database: 3/10/2026, 5:34:45 PM

Last enriched: 3/10/2026, 5:49:13 PM

Last updated: 3/12/2026, 8:09:22 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses