Description

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.3.1, the S3 storage manager's isAuthorized() function is declared async (returns Promise<boolean>) but is called without await in both the POST and PUT handlers. Since a Promise object is always truthy in JavaScript, !isAuthorized(type) always evaluates to false, completely bypassing the authorization check. Any authenticated user with the lowest visitor role can upload, delete, rename, and list all files in the S3 bucket. This vulnerability is fixed in 0.3.1.

INFO

Published Date :

2026-03-11T20:03:05.319Z

Last Modified :

2026-03-12T19:51:19.210Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-32101 vulnerability.

Vendors Products
Studiocms
  • S3-storage
  • Studiocms
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32101.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact