Description
StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. This vulnerability is fixed in 0.4.0.
Published: 2026-03-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the /studiocms_api/dashboard/api-tokens endpoint of StudioCMS, which does not validate that the user creating a token is authorized to do so for the target user ID. As a result, any authenticated user at least with Editor level can generate API tokens for other users, including owners and administrators, thereby gaining full administrative access. This flaw permits unprivileged attackers to impersonate admin users and potentially modify or delete content, access sensitive data, or gain further system compromise. The weakness aligns with CWE‑639 (Authorization Bypass Through User-Controlled Key) and CWE‑863 (Privilege Escalation via Improper Access Control).

Affected Systems

StudioCMS version releases prior to 0.4.0 are affected. The vulnerability is present in all releases shipped before the 0.4.0 update, which introduced proper access control for token generation. The product, developed by withstudiocms, is a server‑side‑rendered, Astro‑native, headless content management system deployed on web servers that expose a REST API.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. The calculated likelihood of exploitation is very low, and the vulnerability is not recorded in the known exploited vulnerabilities catalog. However, since any authenticated user can exploit the flaw, the attack vector is relatively simple and requires only possession of credentials that grant at least Editor role. Once exploited, the attacker can create tokens that authorize actions with elevated privileges. The lack of known active exploits implies a low exploitation probability, but the potential impact remains high if the flaw is discovered and used in a targeted campaign.

Generated by OpenCVE AI on April 17, 2026 at 11:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade StudioCMS to version 0.4.0 or later to apply the vendor’s patch that enforces proper authorization checks
  • Restrict the /studiocms_api/dashboard/api-tokens endpoint so that only owner or administrator accounts can create or manage tokens, or disable token creation for non‑admin roles in the configuration
  • Monitor API logs for anomalous token creation activity and enforce monitoring policies to detect privilege escalation attempts

Generated by OpenCVE AI on April 17, 2026 at 11:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-667w-mmh7-mrr4 StudioCMS has Privilege Escalation via Insecure API Token Generation
History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Studiocms
Studiocms studiocms
CPEs cpe:2.3:a:studiocms:studiocms:*:*:*:*:*:*:*:*
Vendors & Products Studiocms
Studiocms studiocms

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Withstudiocms
Withstudiocms studiocms
Vendors & Products Withstudiocms
Withstudiocms studiocms

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. This vulnerability is fixed in 0.4.0.
Title StudioCMS Affected by Privilege Escalation via Insecure API Token Generation
Weaknesses CWE-639
CWE-863
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Studiocms Studiocms
Withstudiocms Studiocms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T17:34:22.878Z

Reserved: 2026-03-07T17:34:39.979Z

Link: CVE-2026-30944

cve-icon Vulnrichment

Updated: 2026-03-10T17:33:54.256Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:54.260

Modified: 2026-03-17T16:14:35.723

Link: CVE-2026-30944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:45:06Z

Weaknesses