Parse Server Vulnerable to Server-Side Request Forgery (SSRF) in File Upload via URI Format
- Severity:
- High
Description
A Server-Side Request Forgery (SSRF) vulnerability in the file upload functionality when trying to upload a Parse.File with uri parameter allows to execute an arbitrary URI. The vulnerability stems from a file upload feature in which Parse Server retrieves the file data from a URI that is provided in the request.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **>= 8.0.0, <= 8.4.0-alpha.1 >= 4.2.0, < 7.5.4** Patched version(s): **8.4.0-alpha.2 7.5.4**
References
Related Issues
- Parse Server is vulnerable to Server-Side Request Forgery (SSRF) via Instagram OAuth Adapter - CVE-2025-68150
- Parse Server vulnerable to stored XSS via file upload of HTML-renderable file types - CVE-2026-31868
- Parse Server vulnerable to stored cross-site scripting (XSS) via SVG file upload - CVE-2026-30948
- uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) - CVE-2022-0086
You might also like:
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on November 07, 2025


