CVE-2026-32103: CWE-639: Authorization Bypass Through User-Controlled Key in withstudiocms studiocms
StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system. This vulnerability is fixed in 0.4.3.
AI Analysis
Technical Summary
StudioCMS is a headless content management system that supports server-side rendering with Astro. In versions prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any user account, including the owner account. The vulnerability stems from the endpoint verifying only that the caller has admin privileges but failing to enforce role hierarchy or verify that the target userId matches the caller's identity. This means an admin can request a reset link for a higher-privileged user without restriction. When combined with the POST /studiocms_api/dashboard/reset-password endpoint, an attacker can reset the password of the owner account, effectively taking full control of the system. The flaw relates to CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-640 (Weak Password Recovery Mechanism). The vulnerability does not require user interaction but does require the attacker to have admin-level access. The CVSS 3.1 score is 6.8, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and impact limited to integrity (account takeover) without confidentiality or availability impact. No known exploits are reported in the wild. The issue was publicly disclosed on March 11, 2026, and fixed in StudioCMS version 0.4.3.
Potential Impact
This vulnerability allows an attacker with admin privileges to escalate their access by taking over the highest-privileged owner account. This can lead to complete compromise of the CMS, including unauthorized content changes, data manipulation, and potential deployment of malicious content or backdoors. The integrity of the system is severely impacted, as the attacker can bypass intended role hierarchies and controls. Although confidentiality and availability are not directly affected, the loss of control over the owner account can indirectly lead to broader security breaches and operational disruptions. Organizations relying on StudioCMS for critical content management risk reputational damage, data integrity loss, and potential regulatory non-compliance if exploited. Since exploitation requires admin credentials, insider threats or compromised admin accounts pose the greatest risk. The vulnerability's presence in versions prior to 0.4.3 means that any deployments not updated are at risk.
Mitigation Recommendations
The primary mitigation is to upgrade StudioCMS to version 0.4.3 or later, where the vulnerability is fixed by enforcing proper role hierarchy checks and validating that the target userId matches the caller's identity. Until upgrade is possible, organizations should restrict admin privileges to trusted personnel only and monitor admin activities closely. Implement multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise. Audit logs should be reviewed regularly for suspicious password reset requests or unusual admin actions. Additionally, consider implementing network segmentation and access controls to limit exposure of the StudioCMS admin interface. If feasible, temporarily disable password reset functionality or restrict it to owner accounts only until patched. Finally, conduct security awareness training to reduce insider threat risks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-32103: CWE-639: Authorization Bypass Through User-Controlled Key in withstudiocms studiocms
Description
StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system. This vulnerability is fixed in 0.4.3.
AI-Powered Analysis
Technical Analysis
StudioCMS is a headless content management system that supports server-side rendering with Astro. In versions prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any user account, including the owner account. The vulnerability stems from the endpoint verifying only that the caller has admin privileges but failing to enforce role hierarchy or verify that the target userId matches the caller's identity. This means an admin can request a reset link for a higher-privileged user without restriction. When combined with the POST /studiocms_api/dashboard/reset-password endpoint, an attacker can reset the password of the owner account, effectively taking full control of the system. The flaw relates to CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-640 (Weak Password Recovery Mechanism). The vulnerability does not require user interaction but does require the attacker to have admin-level access. The CVSS 3.1 score is 6.8, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and impact limited to integrity (account takeover) without confidentiality or availability impact. No known exploits are reported in the wild. The issue was publicly disclosed on March 11, 2026, and fixed in StudioCMS version 0.4.3.
Potential Impact
This vulnerability allows an attacker with admin privileges to escalate their access by taking over the highest-privileged owner account. This can lead to complete compromise of the CMS, including unauthorized content changes, data manipulation, and potential deployment of malicious content or backdoors. The integrity of the system is severely impacted, as the attacker can bypass intended role hierarchies and controls. Although confidentiality and availability are not directly affected, the loss of control over the owner account can indirectly lead to broader security breaches and operational disruptions. Organizations relying on StudioCMS for critical content management risk reputational damage, data integrity loss, and potential regulatory non-compliance if exploited. Since exploitation requires admin credentials, insider threats or compromised admin accounts pose the greatest risk. The vulnerability's presence in versions prior to 0.4.3 means that any deployments not updated are at risk.
Mitigation Recommendations
The primary mitigation is to upgrade StudioCMS to version 0.4.3 or later, where the vulnerability is fixed by enforcing proper role hierarchy checks and validating that the target userId matches the caller's identity. Until upgrade is possible, organizations should restrict admin privileges to trusted personnel only and monitor admin activities closely. Implement multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise. Audit logs should be reviewed regularly for suspicious password reset requests or unusual admin actions. Additionally, consider implementing network segmentation and access controls to limit exposure of the StudioCMS admin interface. If feasible, temporarily disable password reset functionality or restrict it to owner accounts only until patched. Finally, conduct security awareness training to reduce insider threat risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-10T22:02:38.854Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b1d0c22f860ef94375751f
Added to database: 3/11/2026, 8:29:54 PM
Last enriched: 3/11/2026, 8:45:19 PM
Last updated: 3/14/2026, 2:35:56 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.