StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the updateUserNotifications endpoint accepts a user ID from the request payload and uses it to update that user's notification preferences. It checks that the caller is logged in but never verifies that the caller owns the target account (id !== userData.user.id). Any authenticated visitor can modify notification preferences for any user, including disabling admin notifications to suppress detection of malicious activity. This vulnerability is fixed in 0.4.3.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Withstudiocms
Withstudiocms studiocms |
|
| Vendors & Products |
Withstudiocms
Withstudiocms studiocms |
Wed, 11 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the updateUserNotifications endpoint accepts a user ID from the request payload and uses it to update that user's notification preferences. It checks that the caller is logged in but never verifies that the caller owns the target account (id !== userData.user.id). Any authenticated visitor can modify notification preferences for any user, including disabling admin notifications to suppress detection of malicious activity. This vulnerability is fixed in 0.4.3. | |
| Title | StudioCMS: IDOR in User Notification Preferences Allows Any Authenticated User to Modify Any User's Settings | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-11T20:09:44.879Z
Updated: 2026-03-12T19:48:05.180Z
Reserved: 2026-03-10T22:02:38.854Z
Link: CVE-2026-32104
Updated: 2026-03-12T19:48:00.284Z
Status : Awaiting Analysis
Published: 2026-03-11T21:16:16.457
Modified: 2026-03-12T21:08:22.643
Link: CVE-2026-32104
No data.