Loading HuntDB...

GHSA-xprv-wvh7-qqqx

GitHub Security Advisory

Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

Keywords that are specified in the Parse Server option `requestKeywordDenylist` can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the `requestKeywordDenylist` option.

### Patches

Improved keyword detection.

### Workarounds

Configure your firewall to only allow trusted servers to make request to the Parse Server Cloud Code Webhooks API, or block the API completely if you are not using the feature.

### Collaborators

Mikhail Shcherbakov, Cristian-Alexandru Staicu and Musard Balliu working with Trend Micro Zero Day Initiative

### References
- https://github.com/parse-community/parse-server/security/advisories/GHSA-xprv-wvh7-qqqx

Affected Packages

npm parse-server
Affected versions: 0 (fixed in 4.10.19)
npm parse-server
Affected versions: 5.0.0 (fixed in 5.3.2)

Related CVEs

Key Information

GHSA ID
GHSA-xprv-wvh7-qqqx
Published
November 9, 2022 8:47 PM
Last Modified
August 21, 2023 6:16 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
parse-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 9, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.