Description
A security incident caused a number of incorrect version tags to be pushed to the Parse Server repository. These version tags linked to a personal fork of a contributor who had write access to the repository. The code to which these tags linked has not been reviewed or approved by Parse Platform.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **>= 4.6.0, < 4.10.0 >= 4.0.0, < 4.5.2** Patched version(s): **4.10.0 4.5.2**
References
Related Issues
- receiving subscription objects with deleted session - CVE-2020-15270
- Parse Server exposes the data schema via GraphQL API - CVE-2025-53364
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- jquery-validation vulnerable to Cross-site Scripting - CVE-2025-3573
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on January 09, 2023