CVE-2026-30944

8.8 HIGH

📋 TL;DR

This vulnerability allows any authenticated user with at least Editor permissions in StudioCMS to generate API tokens for any other user, including administrative accounts. This results in full privilege escalation, enabling attackers to gain unauthorized access to sensitive functions. All StudioCMS instances running versions before 0.4.0 with authenticated users are affected.

💻 Affected Systems

Products:
  • StudioCMS
Versions: All versions prior to 0.4.0
Operating Systems: All platforms running StudioCMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least one authenticated user with Editor or higher permissions. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with Editor access can generate API tokens for admin/owner accounts, gaining full administrative control over the StudioCMS instance, potentially leading to data theft, system compromise, or complete takeover.

🟠

Likely Case

Malicious or compromised Editor users escalate their privileges to admin level, accessing sensitive data, modifying configurations, or creating backdoors in the system.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized token generation attempts are detected and blocked before privilege escalation occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is well-documented in public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.4.0

Vendor Advisory: https://github.com/withstudiocms/studiocms/security/advisories/GHSA-667w-mmh7-mrr4

Restart Required: Yes

Instructions:

1. Backup your StudioCMS instance and database. 2. Update StudioCMS to version 0.4.0 or later using your package manager or by downloading from GitHub. 3. Restart the StudioCMS service. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable API Token Endpoint

all

Temporarily disable or restrict access to the vulnerable /studiocms_api/dashboard/api-tokens endpoint

# Configure web server (nginx example)
location /studiocms_api/dashboard/api-tokens {
    deny all;
    return 403;
}

Implement Network Access Controls

linux

Restrict access to the StudioCMS dashboard to trusted IP addresses only

# Firewall rule example (iptables)
iptables -A INPUT -p tcp --dport 3000 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 3000 -j DROP

🧯 If You Can't Patch

  • Implement strict access controls and monitor all API token generation activities
  • Regularly audit user permissions and remove unnecessary Editor-level access

🔍 How to Verify

Check if Vulnerable:

Check StudioCMS version. If version is less than 0.4.0, the system is vulnerable. Test authenticated access to /studiocms_api/dashboard/api-tokens endpoint with Editor credentials.

Check Version:

Check package.json or run: npm list @withstudiocms/studiocms

Verify Fix Applied:

After updating to 0.4.0, verify that Editor users can no longer generate API tokens for other users. Test the endpoint with Editor credentials attempting to create tokens for admin accounts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple API token generation requests from non-admin users
  • Token generation for user IDs different from the requesting user
  • Unusual API token usage patterns

Network Indicators:

  • POST requests to /studiocms_api/dashboard/api-tokens with different user_id parameters
  • Increased API token generation activity

SIEM Query:

source="studiocms" AND (path="/studiocms_api/dashboard/api-tokens" AND method="POST") AND (user_role="editor" AND target_user_id!=current_user_id)

🔗 References

📤 Share & Export