Description
StudioCMS is a server-side-rendered, Astro native, headless content management system. Versions prior to 0.2.0 contain a Broken Object Level Authorization (BOLA) vulnerability in the Content Management feature that allows users with the "Visitor" role to access draft content created by Editor/Admin/Owner users. Version 0.2.0 patches the issue.
Published: 2026-01-27
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to draft content
Action: Patch to v0.2.0
AI Analysis

Impact

StudioCMS v0.1.x and earlier expose a broken object level authorization flaw in the content‑management subsystem. The flaw allows users with the minimally privileged "Visitor" role to read draft articles created by Editors, Admins, or Owners. There is no code‑execution or privilege‑escalation component; the issue results in a confidentiality breach, leaking unpublished editorial material to unauthenticated or low‑privileged users. The weakness is classified as BOLA (CWE‑639) and a form of authorization bypass (CWE‑862).

Affected Systems

Any deployment of StudioCMS from vendor withstudiocms, prior to version 0.2.0, is affected. The exposed endpoints appear in the server‑side rendered, Astro‑native headless CMS platform. Updated releases (0.2.0 and later) address the flaw.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate impact and medium exploitation difficulty. With an EPSS score of less than 1 per cent, this vulnerability is currently considered low probability of real‑world exploitation, and it is not listed in the CISA KEV catalog. The likely attack vector is a remote HTTP request made by a Visitor‑role user or an automated scanner that can crawl the site and attempt to access draft content via exposed endpoints. An attacker who succeeds will gain read access to any unpublished content, potentially compromising competitive advantage or confidential information.

Generated by OpenCVE AI on April 18, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade StudioCMS to version 0.2.0 or newer, which patches the broken object‑level authorization bug.
  • Remove or restrict the Visitor role’s permissions so it can only access publicly published content, ensuring drafts remain inaccessible.
  • Monitor content‑management logs for unexpected read attempts to draft pages and investigate any anomalies.

Generated by OpenCVE AI on April 18, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8cw6-53m5-4932 StudioCMS has Authorization Bypass Through User-Controlled Key
History

Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Studiocms
Studiocms studiocms
CPEs cpe:2.3:a:studiocms:studiocms:*:*:*:*:*:*:*:*
Vendors & Products Studiocms
Studiocms studiocms

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Withstudiocms
Withstudiocms studiocms
Vendors & Products Withstudiocms
Withstudiocms studiocms

Tue, 27 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description StudioCMS is a server-side-rendered, Astro native, headless content management system. Versions prior to 0.2.0 contain a Broken Object Level Authorization (BOLA) vulnerability in the Content Management feature that allows users with the "Visitor" role to access draft content created by Editor/Admin/Owner users. Version 0.2.0 patches the issue.
Title StudioCMS has an Authorization Bypass Through User-Controlled Key
Weaknesses CWE-639
CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Studiocms Studiocms
Withstudiocms Studiocms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T15:08:38.778Z

Reserved: 2026-01-21T18:38:22.474Z

Link: CVE-2026-24134

cve-icon Vulnrichment

Updated: 2026-01-28T15:08:32.325Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T00:15:50.330

Modified: 2026-03-17T15:39:51.403

Link: CVE-2026-24134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:00:10Z

Weaknesses