ApostropheCMS MFA Bypass (CVE-2026-32730)
CVE-2026-32730
ApostropheCMS is an open-source content management framework. Prior to version 4.28.0, the bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incor...
Overview
A critical security vulnerability has been identified in ApostropheCMS, an open-source content management framework. This flaw, tracked as CVE-2026-32730, allows an attacker to bypass multi-factor authentication (MFA) protections entirely, potentially granting unauthorized access to administrative accounts and sensitive content.
Vulnerability Details
In versions prior to 4.28.0, the bearer token authentication middleware contains an incorrect database query. This flaw incorrectly validates login tokens. Specifically, it accepts tokens from login attempts where only the password was verified, but subsequent security requirements-like Time-based One-Time Password (TOTP) or other custom MFA checks-were not completed.
In simple terms, the system mistakenly treats a partially completed login (password correct, MFA pending) as a fully successful login. This allows an attacker who has obtained a valid password to skip the MFA step completely and authenticate as the user. The vulnerability affects any deployment using the official @apostrophecms/login-totp module or any custom login requirement implemented via the afterPasswordVerified hook.
Impact
The impact of this vulnerability is severe (CVSS score: 8.1, HIGH). Successful exploitation leads to a complete bypass of MFA, a critical defense-in-depth security control. Attackers with a compromised password could gain unauthorized administrative access to the CMS backend. This could result in website defacement, data theft, or the injection of malicious code. For organizations handling sensitive data, this could lead to significant compliance violations and data breaches. You can review past incidents stemming from authentication flaws in our breach reports.
Remediation and Mitigation
The primary and immediate action is to update your ApostropheCMS installation.
1. Immediate Patching: Upgrade ApostropheCMS to version 4.28.0 or later. This version contains the corrected MongoDB query that properly validates tokens only after all login requirements, including MFA, are satisfied.
2. Password Hygiene: As a secondary measure, ensure all user accounts, especially administrative ones, are using strong, unique passwords. While this does not fix the vulnerability, it makes the initial password compromise required for exploitation more difficult.
3. Monitor for Suspicious Activity: Administrators should review audit logs for any unusual login patterns or administrative actions that occurred prior to patching. Staying informed on emerging threats is crucial; follow the latest developments in our security news section.
There is no effective workaround for this issue without applying the patch. All users of affected versions are strongly urged to update immediately to secure their systems against this MFA bypass.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-32730?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when using a SAML Source that has the option Verify Assertion Signature under Verification Certificate enabl...
An authentication bypass vulnerability in Network Service allows unauthorized access to protected resources...
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplie...
A security flaw has been discovered in MacCMS 2025.1000.4052. This affects an unknown part of the file application/api/controller/Timming.php of the component Timming API Endpoint. The manipulation re...