Loading HuntDB...

GHSA-6927-3vr9-fxf2

GitHub Security Advisory

ZDI-CAN-19105: Parse Server literalizeRegexPart SQL Injection

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.

### Patches

The algorithm to detect SQL injection has been improved.

### Workarounds

None.

### References

- https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
- https://github.com/parse-community/parse-server/releases/tag/6.5.0 (fixed in Parse Server 6)
- https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20 (fixed in Parse Server 7 alpha release)

### Credits

- Mikhail Shcherbakov (https://twitter.com/yu5k3) working with Trend Micro Zero Day Initiative (finder)
- Ehsan Persania (remediation developer)
- Manuel Trezza (coordinator)

Affected Packages

npm parse-server
Affected versions: 0 (fixed in 6.5.0)
npm parse-server
Affected versions: 7.0.0-alpha.1 (fixed in 7.0.0-alpha.20)

Related CVEs

Key Information

GHSA ID
GHSA-6927-3vr9-fxf2
Published
March 1, 2024 8:08 PM
Last Modified
March 1, 2024 8:08 PM
CVSS Score
9.0 /10
Primary Ecosystem
npm
Primary Package
parse-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.