Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32101: CWE-863: Incorrect Authorization in @studiocms s3-storage

0
High
VulnerabilityCVE-2026-32101cvecve-2026-32101cwe-863
Published: Wed Mar 11 2026 (03/11/2026, 20:03:05 UTC)
Source: CVE Database V5
Vendor/Project: @studiocms
Product: s3-storage

Description

CVE-2026-32101 is a high-severity authorization bypass vulnerability in the @studiocms s3-storage manager versions prior to 0. 3. 1. The flaw arises because the asynchronous isAuthorized() function is called without awaiting its Promise result, causing the authorization check to always pass. This allows any authenticated user with the lowest visitor role to perform unauthorized file operations such as upload, delete, rename, and list on the S3 bucket. The vulnerability affects server-side-rendered, Astro native, headless CMS deployments using vulnerable versions of the s3-storage manager. No user interaction is required beyond authentication, and the vulnerability is remotely exploitable over the network. The issue is fixed in version 0. 3. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:20:04 UTC

Technical Analysis

CVE-2026-32101 is an incorrect authorization vulnerability (CWE-863) found in the s3-storage manager component of StudioCMS, a server-side-rendered, Astro native headless content management system. The root cause is a programming error where the asynchronous isAuthorized() function, which returns a Promise<boolean>, is invoked without the await keyword in both POST and PUT HTTP handlers. In JavaScript, a Promise object is always truthy, so the negation check (!isAuthorized(type)) incorrectly evaluates to false, effectively bypassing the authorization logic. As a result, any authenticated user—even those with the minimal visitor role—can bypass intended access controls and perform critical file operations on the connected Amazon S3 bucket, including uploading, deleting, renaming, and listing files. This bypass compromises the integrity and availability of stored content. The vulnerability affects all versions of the s3-storage manager prior to 0.3.1 and was publicly disclosed on March 11, 2026. While no known exploits are currently reported in the wild, the vulnerability is remotely exploitable without user interaction beyond authentication. The CVSS v3.1 base score is 7.6, reflecting high severity due to low attack complexity, required privileges, and significant impact on integrity and availability. The issue is resolved by properly awaiting the asynchronous authorization check in version 0.3.1.

Potential Impact

The vulnerability allows any authenticated user with minimal privileges to bypass authorization controls and manipulate files in the S3 bucket used by StudioCMS. This can lead to unauthorized data modification, deletion, or addition, undermining data integrity. Attackers could deface websites, inject malicious content, or disrupt service availability by deleting or renaming critical files. Confidentiality impact is limited since the attacker must be authenticated, but integrity and availability impacts are high. Organizations relying on StudioCMS for content delivery or storage could face reputational damage, data loss, and service disruption. The ease of exploitation and network accessibility increase the risk of widespread abuse if not promptly mitigated.

Mitigation Recommendations

Organizations should immediately upgrade the @studiocms s3-storage manager to version 0.3.1 or later, where the authorization bypass is fixed by correctly awaiting the asynchronous isAuthorized() function. Until upgrading, restrict access to the CMS to trusted users only and monitor S3 bucket activity for unauthorized file operations. Implement additional access controls at the S3 bucket policy level to limit file operations to authorized service accounts. Conduct code reviews to ensure all asynchronous authorization checks are properly awaited in custom or forked versions. Employ runtime monitoring and alerting for anomalous file operations. Regularly audit user roles and permissions within StudioCMS to minimize the number of users with authenticated access. Consider isolating the CMS environment and S3 buckets behind network segmentation and VPNs to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.854Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1d0c22f860ef94375751c

Added to database: 3/11/2026, 8:29:54 PM

Last enriched: 3/19/2026, 2:20:04 AM

Last updated: 4/28/2026, 7:23:20 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses