Description
If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **>= 7.0.0, < 7.3.0 < 6.5.9** Patched version(s): **7.3.0 6.5.9**
References
Related Issues
- Parse Server has role escalation and CLP bypass via direct `_Join` table write - CVE-2026-30966
- ZDI-CAN-19105: Parse Server literalizeRegexPart SQL Injection - CVE-2024-27298
- Parse Server session creation endpoint allows overwriting server-generated session fields - CVE-2026-32742
- Parse Server allows public `explain` queries which may expose sensitive database performance information and schema deta - CVE-2025-64502
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on November 13, 2024