CVE-2026-32638
Received Received - Intake
Authorization Bypass in StudioCMS getUsers Endpoint Exposes Owner Data

Publication date: 2026-03-18

Last updated on: 2026-03-19

Assigner: GitHub, Inc.

Description
StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.4, the REST API `getUsers` endpoint in StudioCMS uses the attacker-controlled `rank` query parameter to decide whether owner accounts should be filtered from the result set. As a result, an admin token can request `rank=owner` and receive owner account records, including IDs, usernames, display names, and email addresses, even though the adjacent `getUser` endpoint correctly blocks admins from viewing owner users. This is an authorization inconsistency inside the same user-management surface. Version 0.4.4 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-19
Generated
2026-05-06
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
studiocms studiocms to 0.4.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-32638 is an authorization bypass vulnerability in StudioCMS's REST API, specifically in the getUsers endpoint prior to version 0.4.4."}, {'type': 'paragraph', 'content': "The vulnerability occurs because the getUsers endpoint uses an attacker-controlled query parameter `rank` to filter user accounts instead of enforcing filtering based on the caller's privilege level."}, {'type': 'paragraph', 'content': 'This flaw allows an admin token to specify `rank=owner` and retrieve owner account records, including sensitive information such as user IDs, usernames, display names, and email addresses.'}, {'type': 'paragraph', 'content': "This is an authorization inconsistency because the adjacent getUser endpoint correctly restricts admins from viewing owner accounts by comparing the caller's rank to the target user's rank."}, {'type': 'paragraph', 'content': "The issue was fixed in version 0.4.4 by changing the filtering logic to compare the caller's rank index to each candidate user's rank index, ensuring admins cannot access owner accounts."}] [2, 3]


How can this vulnerability impact me? :

This vulnerability allows an attacker with an admin token to enumerate owner accounts and access sensitive information such as IDs, usernames, display names, and email addresses of high-privilege users.

By bypassing intended authorization boundaries, attackers can use this information for phishing, social engineering, or targeted attacks against owner accounts.

Although the severity is rated low (CVSS 2.7), the exposure of owner account details can facilitate further attacks or privilege escalation attempts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to access the StudioCMS REST API getUsers endpoint with an admin token and specifying the query parameter rank=owner. If the response includes owner account records such as IDs, usernames, display names, and email addresses, the system is vulnerable.'}, {'type': 'paragraph', 'content': 'A suggested command to test this would be an HTTP GET request like: GET /users?rank=owner using an admin token for authentication.'}, {'type': 'paragraph', 'content': 'For example, using curl (replace <admin_token> and <studiocms_url>):'}, {'type': 'list_item', 'content': 'curl -H "Authorization: Bearer <admin_token>" "https://<studiocms_url>/users?rank=owner"'}, {'type': 'paragraph', 'content': 'If the response contains owner user data, this confirms the authorization bypass vulnerability.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade StudioCMS to version 0.4.4 or later, where the vulnerability has been fixed.'}, {'type': 'paragraph', 'content': "The fix involves changing the user filtering logic in the getUsers endpoint to enforce access control based on the caller's rank rather than the user-supplied rank query parameter."}, {'type': 'paragraph', 'content': 'Until the upgrade can be applied, restrict admin tokens from making requests with the rank=owner parameter or monitor and block such requests at the network or application firewall level.'}, {'type': 'paragraph', 'content': 'Additionally, review and audit API access logs for suspicious queries attempting to enumerate owner accounts.'}] [2, 3, 1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart