Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution
- Severity:
- High
Description
An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **>= 6.0.0, < 6.2.1 < 5.5.2** Patched version(s): **6.2.1 5.5.2**
References
Related Issues
- parse-server crashes when receiving file download request with invalid byte range - CVE-2022-39313
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) 8 - CVE-2025-65944
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) 7 - CVE-2025-65944
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on November 06, 2023