Home

Description

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. This vulnerability is fixed in 0.4.0.

PUBLISHED Reserved 2026-03-07 | Published 2026-03-10 | Updated 2026-03-10 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-863: Incorrect Authorization

Product status

< 0.4.0
affected

References

github.com/...diocms/security/advisories/GHSA-667w-mmh7-mrr4

github.com/...ommit/f4a209fc090c90195e2419fff47b48a46eab7441

github.com/...udiocms/studiocms/releases/tag/studiocms@0.4.0

cve.org (CVE-2026-30944)

nvd.nist.gov (CVE-2026-30944)

Download JSON