{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T19:37:24.271","vulnerabilities":[{"cve":{"id":"CVE-2026-30945","sourceIdentifier":"security-advisories@github.com","published":"2026-03-10T18:18:54.433","lastModified":"2026-03-17T16:17:30.660","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the DELETE /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user with editor privileges or above to revoke API tokens belonging to any other user, including admin and owner accounts. The handler accepts tokenID and userID directly from the request payload without verifying token ownership, caller identity, or role hierarchy. This enables targeted denial of service against critical integrations and automations. This vulnerability is fixed in 0.4.0."},{"lang":"es","value":"StudioCMS es un sistema de gestión de contenido renderizado en el lado del servidor, nativo de Astro y sin cabeza. Antes de la versión 0.4.0, el endpoint DELETE /studiocms_api/dashboard/api-tokens permite a cualquier usuario autenticado con privilegios de editor o superiores revocar tokens de API pertenecientes a cualquier otro usuario, incluyendo cuentas de administrador y propietario. El gestor acepta tokenID y userID directamente del payload de la solicitud sin verificar la propiedad del token, la identidad del llamador o la jerarquía de roles. Esto permite una denegación de servicio dirigida contra integraciones y automatizaciones críticas. Esta vulnerabilidad está corregida en la versión 0.4.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"},{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:studiocms:studiocms:*:*:*:*:*:*:*:*","versionEndExcluding":"0.4.0","matchCriteriaId":"087DD76D-B0EE-4D64-BDDD-9EDC994C5F1F"}]}]}],"references":[{"url":"https://github.com/withstudiocms/studiocms/commit/9eec9c3b45523b635cfe16d55aa55afabacbebe3","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/withstudiocms/studiocms/releases/tag/studiocms@0.4.0","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/withstudiocms/studiocms/security/advisories/GHSA-8rgj-vrfr-6hqr","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}