Parse Server's Cloud function dispatch crashes server via prototype chain traversal
- Severity:
- High
Description
Remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.47 >= 9.0.0, < 9.6.0-alpha.24** Patched version(s): **8.6.47 9.6.0-alpha.24**
References
Related Issues
- Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution - CVE-2026-30939
- Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers - CVE-2022-41878
- Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks - CVE-2022-41879
- Parse Server vulnerable to schema poisoning via prototype pollution in deep copy - CVE-2026-32878
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 19, 2026