Cyber Posture

CVE-2026-32101

HighPublic PoC

Published: 11 March 2026

Published
11 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
EPSS Score 0.0005 14.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32101 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Studiocms Studiocms. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The authz bypass in the public-facing CMS (async/await flaw in isAuthorized) is directly exploitable via T1190; resulting unauthorized file ops on S3 from a low-priv account constitute T1068.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.3.1, the S3 storage manager's isAuthorized() function is declared async (returns Promise<boolean>) but is called without await in both the POST and PUT handlers. Since a Promise object…

more

is always truthy in JavaScript, !isAuthorized(type) always evaluates to false, completely bypassing the authorization check. Any authenticated user with the lowest visitor role can upload, delete, rename, and list all files in the S3 bucket. This vulnerability is fixed in 0.3.1.

Deeper analysisAI

StudioCMS, a server-side-rendered, Astro native, headless content management system, contains a vulnerability in versions prior to 0.3.1 designated as CVE-2026-32101. The issue resides in the S3 storage manager's isAuthorized() function, which is declared as async and returns a Promise<boolean>, but is invoked without await in both POST and PUT handlers. In JavaScript, a Promise object is always truthy, causing !isAuthorized(type) to always evaluate to false and fully bypass the authorization check. This flaw is classified under CWE-863 (Incorrect Authorization) with a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L).

Any authenticated user with the lowest visitor role can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants the ability to upload, delete, rename, and list all files in the associated S3 bucket, resulting in low confidentiality and availability impacts but high integrity impact.

The vulnerability is addressed in StudioCMS version 0.3.1. Additional details are available in the GitHub security advisory at https://github.com/withstudiocms/studiocms/security/advisories/GHSA-mm78-fgq8-6pgr.

Details

CWE(s)

Affected Products

studiocms
studiocms
≤ 0.3.1

CVEs Like This One

CVE-2026-30944Same product: Studiocms Studiocms
CVE-2026-32103Same product: Studiocms Studiocms
CVE-2026-30945Same product: Studiocms Studiocms
CVE-2026-32106Same product: Studiocms Studiocms
CVE-2025-30093Shared CWE-863
CVE-2026-41191Shared CWE-863
CVE-2026-32267Shared CWE-863
CVE-2026-25859Shared CWE-863
CVE-2025-21556Shared CWE-863
CVE-2026-42426Shared CWE-863

References