Description
StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the REST API createUser endpoint uses string-based rank checks that only block creating owner accounts, while the Dashboard API uses indexOf-based rank comparison that prevents creating users at or above your own rank. This inconsistency allows an admin to create additional admin accounts via the REST API, enabling privilege proliferation and persistence. This vulnerability is fixed in 0.4.3.
Published: 2026-03-11
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

StudioCMS, a server‑side‑rendered, Astro‑native headless CMS, contains a flaw in the REST API createUser endpoint where a string‑based rank check only blocks the creation of owner accounts. The Dashboard API, by contrast, uses an indexOf‑based comparison that correctly prevents users from creating accounts at or above their own rank. This inconsistency allows an authenticated admin to create additional admin accounts through the REST API, thereby increasing the number and persistence of privileged accounts. The vulnerability is classified as CWE‑269 (Elevation of Privilege). The impact is confined to privilege escalation and does not explicitly state that additional functions such as content exfiltration are possible.

Affected Systems

All installations of StudioCMS with a version older than 0.4.3 are affected. The affected product is identified by the CPE string cpe:2.3:a:studiocms:studiocms:*:*:*:*:*:*:*:* and is distributed by the vendor withstudiocms.

Risk and Exploitability

The CVSS base score is 4.7, indicating moderate severity. The EPSS score is less than 1%, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an existing admin account with access to the REST API; the attacker must send a createUser request containing an admin rank. The likely attack vector, based on the description, is a network‑based API request from an environment that already has administrative privileges or has compromised an admin user. This attack enables privilege proliferation but does not grant any further exploits beyond elevating administrative privileges.

Generated by OpenCVE AI on March 17, 2026 at 17:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update StudioCMS to version 0.4.3 or later.

Generated by OpenCVE AI on March 17, 2026 at 17:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wj56-g96r-673q StudioCMS: REST API Missing Rank Check Allows Admin to Create Peer Admin Accounts
History

Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Studiocms
Studiocms studiocms
CPEs cpe:2.3:a:studiocms:studiocms:*:*:*:*:*:*:*:*
Vendors & Products Studiocms
Studiocms studiocms

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Withstudiocms
Withstudiocms studiocms
Vendors & Products Withstudiocms
Withstudiocms studiocms

Wed, 11 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the REST API createUser endpoint uses string-based rank checks that only block creating owner accounts, while the Dashboard API uses indexOf-based rank comparison that prevents creating users at or above your own rank. This inconsistency allows an admin to create additional admin accounts via the REST API, enabling privilege proliferation and persistence. This vulnerability is fixed in 0.4.3.
Title StudioCMS: REST API Missing Rank Check Allows Admin to Create Peer Admin Accounts
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Studiocms Studiocms
Withstudiocms Studiocms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T19:48:33.042Z

Reserved: 2026-03-10T22:02:38.854Z

Link: CVE-2026-32106

cve-icon Vulnrichment

Updated: 2026-03-12T19:48:30.362Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T21:16:16.603

Modified: 2026-03-17T15:36:52.710

Link: CVE-2026-32106

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:37:20Z

Weaknesses