StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the REST API createUser endpoint uses string-based rank checks that only block creating owner accounts, while the Dashboard API uses indexOf-based rank comparison that prevents creating users at or above your own rank. This inconsistency allows an admin to create additional admin accounts via the REST API, enabling privilege proliferation and persistence. This vulnerability is fixed in 0.4.3.
References
| Link | Resource |
|---|---|
| https://github.com/withstudiocms/studiocms/security/advisories/GHSA-wj56-g96r-673q | Exploit Vendor Advisory |
Configurations
History
17 Mar 2026, 15:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Studiocms studiocms
Studiocms |
|
| Summary |
|
|
| CPE | cpe:2.3:a:studiocms:studiocms:*:*:*:*:*:*:*:* | |
| References | () https://github.com/withstudiocms/studiocms/security/advisories/GHSA-wj56-g96r-673q - Exploit, Vendor Advisory |
11 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 21:16
Updated : 2026-03-17 15:36
NVD link : CVE-2026-32106
Mitre link : CVE-2026-32106
CVE.ORG link : CVE-2026-32106
JSON object : View
Products Affected
studiocms
- studiocms
CWE
CWE-269
Improper Privilege Management
