logo

CVE-2025-53364 parse-server

Package

Manager: npm
Name: parse-server
Vulnerable Version: >=8.0.0 <8.2.2 || >=5.3.0 <7.5.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01178 pctl0.77945

Details

Parse Server exposes the data schema via GraphQL API ### Impact The Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface. ### Patches The issue has been addressed by requiring the master key for schema introspection. Additionally, a new Parse Server configuration option, `graphQLPublicIntrospection`, has been introduced. This option allows developers to re-enable public schema introspection if their application relies on it. However, it is strongly recommended to use this option only temporarily and to update the application to function without depending on public introspection. ### Workarounds None available. ### References - GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-48q3-prgv-gm4w - Fix for Parse Server 7: https://github.com/parse-community/parse-server/pull/9820 - Fix for Parse Server 8: https://github.com/parse-community/parse-server/pull/9819

Metadata

Created: 2025-07-10T16:50:36Z
Modified: 2025-07-10T19:22:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-48q3-prgv-gm4w/GHSA-48q3-prgv-gm4w.json
CWE IDs: ["CWE-497"]
Alternative ID: GHSA-48q3-prgv-gm4w
Finding: F017
Auto approve: 1