CVE-2026-32106

4.7 MEDIUM

📋 TL;DR

StudioCMS versions before 0.4.3 have inconsistent authorization checks between REST API and Dashboard API user creation endpoints. This allows authenticated admin users to create additional admin accounts via the REST API, enabling privilege escalation and persistence. Only StudioCMS instances with admin users are affected.

💻 Affected Systems

Products:
  • StudioCMS
Versions: All versions prior to 0.4.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires an authenticated admin user to exploit. The vulnerability exists in the default configuration of affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access creates multiple admin accounts, establishes persistence, and potentially takes full control of the CMS instance and underlying server.

🟠

Likely Case

A compromised or malicious admin creates additional admin accounts to maintain access even if their original account is removed or monitored.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized admin account creation which can be detected and remediated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.4.3

Vendor Advisory: https://github.com/withstudiocms/studiocms/security/advisories/GHSA-wj56-g96r-673q

Restart Required: Yes

Instructions:

1. Backup your StudioCMS instance and database. 2. Update StudioCMS to version 0.4.3 or later. 3. Restart the StudioCMS service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable REST API user creation

all

Temporarily disable or restrict access to the REST API createUser endpoint until patching is possible.

Configure web server (nginx/apache) to block POST requests to /api/users endpoint
Implement middleware to reject createUser requests

Implement API gateway restrictions

all

Use API gateway or reverse proxy to restrict admin API access to trusted IP addresses only.

nginx: location /api { allow 192.168.1.0/24; deny all; }
apache: Require ip 192.168.1.0/24

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for admin accounts
  • Regularly audit user accounts and remove unauthorized admin accounts

🔍 How to Verify

Check if Vulnerable:

Check StudioCMS version. If version is less than 0.4.3, the system is vulnerable if admin accounts exist.

Check Version:

Check package.json for version or run: npm list @withstudiocms/studiocms

Verify Fix Applied:

After updating to 0.4.3+, attempt to create an admin account via REST API with admin credentials - this should fail with proper authorization error.

📡 Detection & Monitoring

Log Indicators:

  • Multiple admin account creations via REST API
  • User creation requests from admin accounts to /api/users endpoint
  • Failed authorization attempts for user creation

Network Indicators:

  • POST requests to /api/users endpoint from admin accounts
  • Unusual spike in user creation activity

SIEM Query:

source="studiocms" AND (path="/api/users" AND method="POST") | stats count by user

🔗 References

📤 Share & Export