Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30945: CWE-639: Authorization Bypass Through User-Controlled Key in withstudiocms studiocms

0
High
VulnerabilityCVE-2026-30945cvecve-2026-30945cwe-639cwe-863
Published: Tue Mar 10 2026 (03/10/2026, 16:52:14 UTC)
Source: CVE Database V5
Vendor/Project: withstudiocms
Product: studiocms

Description

CVE-2026-30945 is a high-severity authorization bypass vulnerability in StudioCMS versions prior to 0. 4. 0. It allows any authenticated user with editor privileges or higher to revoke API tokens belonging to other users, including administrators and owners, without proper ownership or role verification. This occurs because the DELETE /studiocms_api/dashboard/api-tokens endpoint accepts tokenID and userID directly from the request payload without validating the caller's identity or role hierarchy. Exploiting this flaw can lead to denial of service against critical integrations and automations relying on those API tokens. The vulnerability does not require user interaction and can be exploited remotely over the network. It is fixed in StudioCMS version 0. 4. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 19:25:11 UTC

Technical Analysis

CVE-2026-30945 is an authorization bypass vulnerability identified in StudioCMS, a server-side-rendered, Astro native, headless content management system. The flaw exists in versions prior to 0.4.0 within the DELETE /studiocms_api/dashboard/api-tokens endpoint. This endpoint allows authenticated users with editor privileges or higher to revoke API tokens belonging to any user, including those with administrative or ownership roles. The vulnerability arises because the API handler accepts tokenID and userID parameters directly from the request payload without verifying if the caller owns the token or has sufficient privileges to revoke it. There is no enforcement of role hierarchy or token ownership validation, violating secure authorization principles (CWE-639 and CWE-863). As a result, a malicious editor-level user can revoke API tokens of other users, disrupting integrations and automated processes that rely on these tokens. The vulnerability has a CVSS v3.1 score of 7.1 (high severity), with an attack vector over the network, low attack complexity, requiring privileges (editor or above), no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact. No known exploits are reported in the wild as of publication. The issue is resolved in StudioCMS version 0.4.0 by implementing proper authorization checks to verify token ownership and caller privileges before allowing token revocation.

Potential Impact

The primary impact of this vulnerability is the potential for denial of service against critical integrations and automation workflows that depend on API tokens for authentication. By revoking API tokens of other users, including administrators and owners, an attacker with editor-level access can disrupt business operations, cause service outages, and potentially delay incident response or administrative actions. Although confidentiality is not directly compromised, the integrity and availability of services relying on these tokens are significantly affected. Organizations using StudioCMS versions prior to 0.4.0 risk operational disruptions, especially those with complex automation or multiple administrators relying on API tokens. This could lead to increased downtime, loss of productivity, and potential financial losses. The vulnerability also undermines trust in role-based access controls within the CMS, potentially encouraging privilege escalation attempts or insider threats.

Mitigation Recommendations

Organizations should immediately upgrade StudioCMS to version 0.4.0 or later, where this vulnerability is fixed with proper authorization checks. Until upgrading, restrict editor-level privileges to trusted users only and monitor API token revocation activities closely for suspicious behavior. Implement compensating controls such as logging and alerting on API token revocation requests to detect unauthorized attempts. Review and tighten role-based access control policies to minimize the number of users with editor or higher privileges. Consider isolating critical integrations and automations to use dedicated service accounts with limited token revocation rights. Additionally, conduct regular audits of API tokens and their usage to quickly identify and remediate disruptions. Employ network segmentation and zero-trust principles to limit lateral movement if an editor-level account is compromised. Finally, educate administrators and users about the risks associated with token management and enforce strong authentication mechanisms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.979Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05635ea502d3aa87d7c00

Added to database: 3/10/2026, 5:34:45 PM

Last enriched: 3/17/2026, 7:25:11 PM

Last updated: 4/28/2026, 4:52:18 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses