CVE-2026-32103

6.8 MEDIUM

📋 TL;DR

This vulnerability allows any authenticated admin user in StudioCMS to generate password reset tokens for any other user, including the highest-privileged owner account. This enables complete account takeover of the most privileged account in the system. All StudioCMS instances running versions before 0.4.3 with admin users are affected.

💻 Affected Systems

Products:
  • StudioCMS
Versions: All versions prior to 0.4.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least one authenticated admin user to exploit. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the highest-privileged owner account, leading to full system control, data exfiltration, and potential destruction of the CMS instance.

🟠

Likely Case

Privilege escalation where a lower-privileged admin takes over the owner account to gain full system access and modify all content.

🟢

If Mitigated

Limited impact if proper role-based access controls and monitoring are in place to detect unusual admin activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. The vulnerability is well-documented in the security advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.4.3

Vendor Advisory: https://github.com/withstudiocms/studiocms/security/advisories/GHSA-h7vr-cg25-jf8c

Restart Required: Yes

Instructions:

1. Update StudioCMS to version 0.4.3 or later. 2. Restart the StudioCMS service. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable vulnerable endpoints

all

Temporarily block access to the vulnerable API endpoints until patching can be completed.

# Configure web server (nginx example) to block POST requests to vulnerable paths
location ~ ^/studiocms_api/dashboard/(create-reset-link|reset-password)$ {
    deny all;
    return 403;
}

Restrict admin access

all

Limit admin privileges to only essential, trusted users and implement multi-factor authentication.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate StudioCMS instances from critical systems.
  • Enable detailed logging and monitoring for all admin actions, especially password reset attempts.

🔍 How to Verify

Check if Vulnerable:

Check the StudioCMS version. If it's below 0.4.3, the system is vulnerable. Review admin user logs for suspicious password reset activities.

Check Version:

Check the package.json file or StudioCMS admin interface for version information.

Verify Fix Applied:

Verify the StudioCMS version is 0.4.3 or higher. Test that admin users can no longer generate reset tokens for other users without proper authorization.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /studiocms_api/dashboard/create-reset-link from admin accounts
  • Password reset attempts for high-privilege accounts from non-owner admins
  • Unusual admin account activity following password resets

Network Indicators:

  • POST requests to vulnerable endpoints from internal admin IPs
  • Unusual patterns of API calls to dashboard endpoints

SIEM Query:

source="studiocms" AND (url_path="/studiocms_api/dashboard/create-reset-link" OR url_path="/studiocms_api/dashboard/reset-password") AND http_method="POST"

🔗 References

📤 Share & Export