CVE-2026-32638
LOWStudioCMS REST getUsers Exposes Owner Account Records to Admin Tokens
Title source: cnaDescription
StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.4, the REST API `getUsers` endpoint in StudioCMS uses the attacker-controlled `rank` query parameter to decide whether owner accounts should be filtered from the result set. As a result, an admin token can request `rank=owner` and receive owner account records, including IDs, usernames, display names, and email addresses, even though the adjacent `getUser` endpoint correctly blocks admins from viewing owner users. This is an authorization inconsistency inside the same user-management surface. Version 0.4.4 fixes the issue.
References (3)
Core 3
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/withstudiocms/studiocms/security/advisories/GHSA-xvf4-ch4q-2m24
X_Refsource_Misc x_refsource_misc
https://github.com/withstudiocms/studiocms/commit/aebe8bcb3618bb07c6753e3f5c982c1fe6adea64
X_Refsource_Misc x_refsource_misc
https://github.com/withstudiocms/studiocms/releases/tag/[email protected]
Scores
CVSS v3
2.7
EPSS
0.0003
EPSS Percentile
7.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-639
Status
published
Products (3)
npm/studiocms
0 - 0.4.4npm
studiocms/studiocms
< 0.4.4
withstudiocms/studiocms
< 0.4.4
Published
Mar 18, 2026
Tracked Since
Mar 19, 2026