๐Ÿ” CVE Alert

CVE-2026-30945

HIGH 7.1

StudioCMS: IDOR โ€” Arbitrary API Token Revocation Leading to Denial of Service

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the DELETE /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user with editor privileges or above to revoke API tokens belonging to any other user, including admin and owner accounts. The handler accepts tokenID and userID directly from the request payload without verifying token ownership, caller identity, or role hierarchy. This enables targeted denial of service against critical integrations and automations. This vulnerability is fixed in 0.4.0.

CWE CWE-639 CWE-863
Vendor withstudiocms
Product studiocms
Published Mar 10, 2026
Last Updated Mar 10, 2026
Stay Ahead of the Next One

Get instant alerts for withstudiocms studiocms

Be the first to know when new high vulnerabilities affecting withstudiocms studiocms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High

Affected Versions

withstudiocms / studiocms
< 0.4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/withstudiocms/studiocms/security/advisories/GHSA-8rgj-vrfr-6hqr github.com: https://github.com/withstudiocms/studiocms/commit/9eec9c3b45523b635cfe16d55aa55afabacbebe3 github.com: https://github.com/withstudiocms/studiocms/releases/tag/[email protected]