StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system. This vulnerability is fixed in 0.4.3.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h7vr-cg25-jf8c | StudioCMS: IDOR — Admin-to-Owner Account Takeover via Password Reset Link Generation |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Withstudiocms
Withstudiocms studiocms |
|
| Vendors & Products |
Withstudiocms
Withstudiocms studiocms |
Wed, 11 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system. This vulnerability is fixed in 0.4.3. | |
| Title | StudioCMS: IDOR — Admin-to-Owner Account Takeover via Password Reset Link Generation | |
| Weaknesses | CWE-639 CWE-640 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T19:48:56.254Z
Reserved: 2026-03-10T22:02:38.854Z
Link: CVE-2026-32103
No data.
Status : Received
Published: 2026-03-11T21:16:16.307
Modified: 2026-03-11T21:16:16.307
Link: CVE-2026-32103
No data.
OpenCVE Enrichment
Updated: 2026-03-12T09:56:16Z
Github GHSA