Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32106: CWE-269: Improper Privilege Management in withstudiocms studiocms

0
Medium
VulnerabilityCVE-2026-32106cvecve-2026-32106cwe-269
Published: Wed Mar 11 2026 (03/11/2026, 20:09:12 UTC)
Source: CVE Database V5
Vendor/Project: withstudiocms
Product: studiocms

Description

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the REST API createUser endpoint uses string-based rank checks that only block creating owner accounts, while the Dashboard API uses indexOf-based rank comparison that prevents creating users at or above your own rank. This inconsistency allows an admin to create additional admin accounts via the REST API, enabling privilege proliferation and persistence. This vulnerability is fixed in 0.4.3.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:44:57 UTC

Technical Analysis

StudioCMS, a server-side-rendered, Astro native, headless content management system, prior to version 0.4.3, contains a privilege management vulnerability (CVE-2026-32106) due to inconsistent rank validation logic between its REST API and Dashboard API. The REST API's createUser endpoint performs rank checks using string comparisons that only block creation of owner-level accounts, whereas the Dashboard API uses a more robust indexOf-based rank comparison that prevents creating users with ranks equal to or higher than the caller's. This discrepancy allows an authenticated admin user to exploit the REST API to create additional admin accounts, circumventing intended privilege restrictions. Such unauthorized creation of admin accounts enables privilege proliferation, potentially allowing attackers or malicious insiders to maintain persistent elevated access within the system. The vulnerability affects all StudioCMS versions before 0.4.3 and does not require user interaction but does require authenticated admin privileges. The CVSS v3.1 base score is 4.7 (medium), reflecting the limited scope and the prerequisite of high privileges for exploitation. No known exploits are currently reported in the wild. The issue was publicly disclosed and fixed in version 0.4.3.

Potential Impact

The vulnerability allows authenticated administrators to create additional admin accounts beyond intended limits, leading to privilege proliferation. This can result in unauthorized administrative access, enabling attackers or malicious insiders to maintain persistent control over the CMS environment. The impact includes potential unauthorized changes to content, configuration, or user management, which can compromise confidentiality, integrity, and availability of the CMS and its hosted content. While exploitation requires existing admin credentials, the ability to create multiple admin accounts increases the attack surface and complicates incident response and remediation. Organizations using vulnerable versions may face risks of insider threats, unauthorized data modification, and prolonged compromise if attackers leverage this flaw to establish backdoor accounts.

Mitigation Recommendations

Organizations should immediately upgrade StudioCMS to version 0.4.3 or later, where this vulnerability is fixed. Until upgrading, restrict access to the REST API createUser endpoint to only highly trusted administrators and monitor API usage logs for suspicious account creation activities. Implement strict role-based access controls and audit trails to detect unauthorized privilege escalations. Additionally, consider employing multi-factor authentication for admin accounts to reduce the risk of credential compromise. Regularly review and prune admin accounts to remove any unauthorized or unnecessary privileged users. Network-level protections such as IP whitelisting for admin API endpoints can further reduce exposure. Finally, integrate vulnerability scanning and patch management processes to ensure timely updates of StudioCMS and related components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.854Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1d0c22f860ef943757525

Added to database: 3/11/2026, 8:29:54 PM

Last enriched: 3/11/2026, 8:44:57 PM

Last updated: 3/13/2026, 10:41:04 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses