Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32103: CWE-639: Authorization Bypass Through User-Controlled Key in withstudiocms studiocms

0
Medium
VulnerabilityCVE-2026-32103cvecve-2026-32103cwe-639cwe-640
Published: Wed Mar 11 2026 (03/11/2026, 20:06:58 UTC)
Source: CVE Database V5
Vendor/Project: withstudiocms
Product: studiocms

Description

CVE-2026-32103 is an authorization bypass vulnerability in StudioCMS versions prior to 0. 4. 3. It affects the POST /studiocms_api/dashboard/create-reset-link endpoint, allowing any authenticated admin user to generate password reset tokens for any other user, including the highest-privileged owner account. The vulnerability arises because the system verifies admin status but does not enforce role hierarchy or validate that the target userId matches the caller's identity. By combining this with the password reset endpoint, an attacker with admin privileges can fully take over the owner account. This flaw has a CVSS score of 6. 8 (medium severity) and does not require user interaction. The vulnerability is fixed in version 0. 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:21:44 UTC

Technical Analysis

StudioCMS is a headless content management system that, prior to version 0.4.3, contains a critical authorization bypass vulnerability identified as CVE-2026-32103. The issue exists in the POST /studiocms_api/dashboard/create-reset-link API endpoint, which allows any authenticated user with admin privileges to generate password reset tokens for arbitrary users, including the system owner. The root cause is insufficient authorization checks: while the endpoint confirms the caller is an admin, it does not enforce role hierarchy or verify that the target userId corresponds to the caller. This lack of validation enables privilege escalation by allowing an admin-level user to reset the password of the highest-privileged account. When combined with the POST /studiocms_api/dashboard/reset-password endpoint, this leads to a complete account takeover of the owner account. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-640 (Weak Password Recovery Mechanism). The CVSS 3.1 score is 6.8, reflecting network exploitability with low attack complexity, requiring high privileges but no user interaction, and impacting integrity with a scope change. No known exploits are currently reported in the wild. The issue was publicly disclosed on March 11, 2026, and fixed in StudioCMS version 0.4.3.

Potential Impact

This vulnerability allows any authenticated admin user to escalate privileges by taking over the highest-privileged owner account, effectively compromising the entire StudioCMS installation. The attacker can reset the owner’s password, gain full control over the CMS, modify content, alter configurations, and potentially deploy malicious code or backdoors. This can lead to significant integrity breaches, loss of trust, and potential data manipulation or destruction. Since StudioCMS is a content management system, the impact extends to any websites or applications relying on it for content delivery, potentially affecting availability indirectly through malicious content or defacement. Organizations using vulnerable versions risk unauthorized administrative control, which can cascade into broader network compromise if the CMS is integrated with other systems. The medium CVSS score reflects that exploitation requires admin privileges, limiting immediate risk to insider threats or compromised admin accounts, but the impact on integrity and scope is severe.

Mitigation Recommendations

The primary mitigation is to upgrade StudioCMS to version 0.4.3 or later, where this vulnerability is fixed. Until upgrade is possible, organizations should strictly limit admin privileges to trusted personnel and enforce strong access controls and monitoring on admin accounts. Implement multi-factor authentication (MFA) for all admin users to reduce the risk of credential compromise. Audit and log all password reset requests and admin actions to detect suspicious activity. Consider network segmentation to isolate the CMS from less trusted networks and restrict API access to known IP addresses. Review and harden password reset workflows and ensure that role hierarchy and user identity validations are enforced in custom or legacy CMS components. Regularly review user roles and permissions to minimize the number of admin accounts. Finally, conduct penetration testing to verify that no other authorization bypasses exist.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.854Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1d0c22f860ef94375751f

Added to database: 3/11/2026, 8:29:54 PM

Last enriched: 3/19/2026, 2:21:44 AM

Last updated: 4/28/2026, 7:13:32 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses