Loading HuntDB...

GHSA-c2hr-cqg6-8j6r

GitHub Security Advisory

ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.

### Patches

The algorithm to detect SQL injection has been improved.

### Workarounds

None.

### References

- https://github.com/parse-community/parse-server/security/advisories/GHSA-c2hr-cqg6-8j6r
- https://github.com/parse-community/parse-server/pull/9167 (fix for Parse Server 7)
- https://github.com/parse-community/parse-server/pull/9168 (fix for Parse Server 6)

### Credits

- Smile Thanapattheerakul of Trend Micro (finder)
- Manuel Trezza (coordinator)

Affected Packages

npm parse-server
Affected versions: 0 (fixed in 6.5.7)
npm parse-server
Affected versions: 7.0.0 (fixed in 7.1.0)

Related CVEs

Key Information

GHSA ID
GHSA-c2hr-cqg6-8j6r
Published
July 1, 2024 6:35 PM
Last Modified
July 2, 2024 2:40 AM
CVSS Score
9.0 /10
Primary Ecosystem
npm
Primary Package
parse-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 12, 2025 6:34 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.