9.1
CVE-2026-34532
- EPSS 0.04%
- Veröffentlicht 31.03.2026 14:42:10
- Zuletzt bearbeitet 02.04.2026 18:01:28
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.67 and 9.7.0-alpha.11, an attacker can bypass Cloud Function validator access controls by appending "prototype.constructor" to the function name in the URL. When a Cloud Function handler is declared using the function keyword and its validator is a plain object or arrow function, the trigger store traversal resolves the handler through its own prototype chain while the validator store fails to mirror this traversal, causing all access control enforcement to be skipped. This allows unauthenticated callers to invoke Cloud Functions that are meant to be protected by validators such as requireUser, requireMaster, or custom validation logic. This issue has been patched in versions 8.6.67 and 9.7.0-alpha.11.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Parseplatform ≫ Parse-server SwPlatformnode.js Version < 8.6.67
Parseplatform ≫ Parse-server SwPlatformnode.js Version >= 9.0.0 < 9.7.0
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha1 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha10 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha2 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha3 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha4 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha5 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha6 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha7 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha8 SwPlatformnode.js
Parseplatform ≫ Parse-server Version9.7.0 Updatealpha9 SwPlatformnode.js
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.113 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
| security-advisories@github.com | 9.1 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-863 Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.