Parse Server vulnerable to schema poisoning via prototype pollution in deep copy
- Severity:
- Medium
Description
An attacker can bypass the default request keyword denylist protection and the class-level permission for adding fields by sending a crafted request that exploits prototype pollution in the deep copy mechanism.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **< 8.6.44 >= 9.0.0, < 9.6.0-alpha.20** Patched version(s): **8.6.44 9.6.0-alpha.20**
References
Related Issues
- Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks - CVE-2022-41879
- Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution - CVE-2023-36475
- Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers - CVE-2022-41878
- Parse Server vulnerable to SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL - CVE-2026-31871
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on March 19, 2026