Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32103: CWE-639: Authorization Bypass Through User-Controlled Key in withstudiocms studiocms

0
Medium
VulnerabilityCVE-2026-32103cvecve-2026-32103cwe-639cwe-640
Published: Wed Mar 11 2026 (03/11/2026, 20:06:58 UTC)
Source: CVE Database V5
Vendor/Project: withstudiocms
Product: studiocms

Description

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system. This vulnerability is fixed in 0.4.3.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:45:19 UTC

Technical Analysis

StudioCMS is a headless content management system that supports server-side rendering with Astro. In versions prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any user account, including the owner account. The vulnerability stems from the endpoint verifying only that the caller has admin privileges but failing to enforce role hierarchy or verify that the target userId matches the caller's identity. This means an admin can request a reset link for a higher-privileged user without restriction. When combined with the POST /studiocms_api/dashboard/reset-password endpoint, an attacker can reset the password of the owner account, effectively taking full control of the system. The flaw relates to CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-640 (Weak Password Recovery Mechanism). The vulnerability does not require user interaction but does require the attacker to have admin-level access. The CVSS 3.1 score is 6.8, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and impact limited to integrity (account takeover) without confidentiality or availability impact. No known exploits are reported in the wild. The issue was publicly disclosed on March 11, 2026, and fixed in StudioCMS version 0.4.3.

Potential Impact

This vulnerability allows an attacker with admin privileges to escalate their access by taking over the highest-privileged owner account. This can lead to complete compromise of the CMS, including unauthorized content changes, data manipulation, and potential deployment of malicious content or backdoors. The integrity of the system is severely impacted, as the attacker can bypass intended role hierarchies and controls. Although confidentiality and availability are not directly affected, the loss of control over the owner account can indirectly lead to broader security breaches and operational disruptions. Organizations relying on StudioCMS for critical content management risk reputational damage, data integrity loss, and potential regulatory non-compliance if exploited. Since exploitation requires admin credentials, insider threats or compromised admin accounts pose the greatest risk. The vulnerability's presence in versions prior to 0.4.3 means that any deployments not updated are at risk.

Mitigation Recommendations

The primary mitigation is to upgrade StudioCMS to version 0.4.3 or later, where the vulnerability is fixed by enforcing proper role hierarchy checks and validating that the target userId matches the caller's identity. Until upgrade is possible, organizations should restrict admin privileges to trusted personnel only and monitor admin activities closely. Implement multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise. Audit logs should be reviewed regularly for suspicious password reset requests or unusual admin actions. Additionally, consider implementing network segmentation and access controls to limit exposure of the StudioCMS admin interface. If feasible, temporarily disable password reset functionality or restrict it to owner accounts only until patched. Finally, conduct security awareness training to reduce insider threat risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.854Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1d0c22f860ef94375751f

Added to database: 3/11/2026, 8:29:54 PM

Last enriched: 3/11/2026, 8:45:19 PM

Last updated: 3/14/2026, 2:35:56 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses