parse
302 known vulnerabilities · 13 critical · 43 high
Parse Javascript SDK vulnerable to prototype pollution in `Parse.Object` and internal APIs
parse-server's session object properties can be updated by foreign user if object ID is known
Remote code execution via MongoDB BSON parser through prototype pollution
Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers
Parse Server vulnerable to brute force guessing of user sensitive data via search patterns
OpenClaw: Voice-call still parses large WebSocket frames before start validation (Incomplete fix for CVE-2026-32062)
Malicious code in bfruitmaliciousxmlparser (npm)
@grackle-ai/server JSON.parse lacks try-catch logic in its gRPC Service AdapterConfig Handling
Parse Dashboard is Missing CSRF Protection for its Agent Endpoint
Parse Server has an auth provider validation bypass on login via partial authData
Sveltejs devalue's `devalue.parse` and `devalue.unflatten` emit objects with `__proto__` own properties
Follow Redirects improperly handles URLs in the url.parse() function
Parse Server has a protected fields bypass via logical query operators
Parse Server has a bypass of class-level permissions in LiveQuery
Malicious code in json-specparse (npm)
jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch
OpenClaw's voice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse
parse-server's endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user
Malicious code in parseq-tracevis (npm)
Parse Server has a SQL injection via query field name when using PostgreSQL
body-parser vulnerable to denial of service when url encoding is enabled
Directus: Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
Parse Server's custom object ID allows to acquire role privileges
Parse Server vulnerable to user enumeration via email verification endpoint
Parse Server: GraphQL `__type` introspection bypass via inline fragments when public introspection is disabled
Parse Server may crash when uploading file without extension
Parse Server's LiveQuery bypasses CLP pointer permission enforcement
fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name
@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking
Malicious code in bigid-filter-recursive-parser (npm)
Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client
nanotar is vulnerable to path traversal in parseTar() and parseTarGzip()
Parse Server LiveQuery subscription with invalid regular expression crashes server
html-parse-stringify and html-parse-stringify2 vulnerable to Regular expression denial of service (ReDoS)
Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evaluation in fast-xml-parser
fast-xml-parser has stack overflow in XMLBuilder with preserveOrder
Parse Server has Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery
Parse Server session creation endpoint allows overwriting server-generated session fields
AWS Lambda parser is vulnerable to Regular Expression Denial of Service
Parse Server has role escalation and CLP bypass via direct `_Join` table write
parse-url parses http URLs incorrectly, making it vulnerable to host name spoofing
Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution
Parse Server's GraphQL WebSocket endpoint bypasses security middleware
`sveltekit-superforms` has Prototype Pollution in `parseFormData` function of `formData.js`
Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization
Parse Server vulnerable to SQL injection via `Increment` operation on nested object field in PostgreSQL
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url
Duplicate Advisory: OpenClaw's voice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse
Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint
Parse Dashboard Has a Cache Key Collision that Leaks Master Key to Read-Only Sessions
Malicious code in @peter_wilson12091/internal-json-test-parser (npm)
ion-parser Prototype Pollution when malicious INI file submitted to application that parses with `parse`
Parse Server vulnerable to schema poisoning via prototype pollution in deep copy
ZDI-CAN-19105: Parse Server literalizeRegexPart SQL Injection
Parse Server has a NoSQL injection via token type in password reset and email verification endpoints
LiquidJS: `renderFile()` / `parseFile()` bypass configured `root` and allow arbitrary file read
Parse Server vulnerable to session token exfiltration via `redirectClassNameForKey` query parameter
Malicious code in hermes-parser-packages (npm)
fast-xml-parser vulnerable to Regex Injection via Doctype Entities
SandboxJS: Stack overflow DoS via deeply nested expressions in recursive descent parser
Parse Server vulnerable to LDAP injection via unsanitized user input in DN and group filter construction
Malicious code in eziparser (npm)
Parse Server affected by empty authData bypassing credential requirement on signup
Parse Server: MFA recovery code single-use bypass via concurrent requests
Duplicate Advisory: Embedded malware in ua-parser-js
Parse Server before v3.4.1 vulnerable to Denial of Service
OpenClaw improperly parses X-Forwarded-For behind trusted proxies allows client IP spoofing in security decisions
devalue affected by CPU and memory amplification from sparse arrays
devalue has prototype pollution in devalue.parse and devalue.unflatten
fast-xml-parser affected by numeric entity expansion bypassing all entity expansion limits (incomplete fix for CVE-2026-26278)
Malicious code in cooieparser (npm)
Duplicate Advisory: OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation
Parse Server is vulnerable to Server-Side Request Forgery (SSRF) via Instagram OAuth Adapter
Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries
Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution
Parse Server missing audience validation in Keycloak authentication adapter
Regular expression Denial of Service in @progfay/scrapbox-parser
Parse Server has a query condition depth bypass via pre-validation transform pipeline
Malicious code in minimum-flow-parser (npm)
ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability
url-parse incorrectly parses hostname / protocol due to unstripped leading control characters.
fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names
Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API
Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields`
OpenClaw: MS Teams webhook parses body before JWT validation, enabling unauthenticated resource exhaustion
Command injection in Parse Server through prototype pollution
Parse Server Vulnerable to Server-Side Request Forgery (SSRF) in File Upload via URI Format
Malicious code in hubl-parser (npm)
Malicious code in custom-query-parse-serialization (npm)
Parse Dashboard has incomplete authentication on AI Agent endpoint
parse-server auth adapter app ID validation can be circumvented
Parse Server OAuth2 authentication adapter account takeover via identity spoofing
Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes
Malicious code in x-session-parser (npm)
Malicious code in bridge-transaction-parser (npm)
Parse Server: `PagesRouter` path traversal allows reading files outside configured pages directory
Zod jsVideoUrlParser vulnerable to ReDoS in util.js
Parse Server: Denial of Service via unindexed database query for unconfigured auth providers
Malicious code in cursorparserfruit (npm)
Parse Server vulnerable to stored cross-site scripting (XSS) via SVG file upload
Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks
Malicious code in viktorparserctf4 (npm)
Malicious code in viktorparserctf7 (npm)
parse-server: Malformed `$regex` query leaks database error details in API response
http-proxy-middleware allows fixRequestBody to proceed even if bodyParser has failed
Malicious code in tna_xmlparser (npm)
Parse Server has SQL Injection through aggregate and distinct field names in PostgreSQL adapter
Authorization Bypass Through User-Controlled Key in url-parse
Malicious code in parse-session (npm)
Malicious code in @asyncapi/avro-schema-parser (npm)
Malicious code in vite-plugin-parseflow (npm)
Parse Server has a Cross-Site Scripting (XSS) vulnerability via Unescaped Mustache Template Variables
Malicious code in @voiceflow/body-parser (npm)
Malicious code in web3-parser (npm)
Parse Server has a login timing side-channel reveals user existence
devalue vulnerable to denial of service due to memory/CPU exhaustion in devalue.parse
Malicious code in @f5rest/odata-v4-parser (npm)
Parse Server vulnerable to SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL
parse-server crashes when receiving file download request with invalid byte range
Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause
Malicious code in moscova-plural-json-parser (npm)
Parse Server's Session Update endpoint allows overwriting server-generated session fields
Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement
Parse Server has a protected field change detection oracle via LiveQuery watch parameter
Malicious code in superbankxmlparser (npm)
Parse Server: SQL injection via dot-notation field name in PostgreSQL
Malicious code in http-parse (npm)
ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse
Parse Server option `masterKeyIps` vulnerability to IP spoofing
Parse Server has a password reset token single-use bypass via concurrent requests
Parse Server vulnerable to stored XSS via file upload of HTML-renderable file types
js-ini Prorotype Pollution when malicious INI files submitted to an application that parses it with `parse`
Hono vulnerable to Prototype Pollution possible through __proto__ key allowed in parseBody({ dot: true })
Malicious code in afruitmaliciousxmlparser (npm)
Malicious code in url-parser-native (npm)
Parse Server exposes auth data via verify password endpoint
body-parser is vulnerable to denial of service when url encoding is used
Parse Server: Account takeover via JWT algorithm confusion in Google auth adapter
Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters
@eslint/plugin-kit is vulnerable to Regular Expression Denial of Service attacks through ConfigCommentParser
Parse Server leaks protected fields via LiveQuery afterEvent trigger
Malicious code in @antstackio/graphql-body-parser (npm)
Malicious code in style-value-parser (npm)
OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation
Malicious code in session-parse (npm)
Malicious code in discord-json-parser (npm)
Parse Server's Cloud function dispatch crashes server via prototype chain traversal
Malicious code in ok-message-parser (npm)
Parse Server: Account takeover via operator injection in authentication data identifier
Malicious code in dtdl-parser (npm)
Malicious code in @puresec/addressparser-malicious (npm)
Parse Server email verification resend page leaks user existence
Malicious code in react-adparser (npm)
Malicious code in viktorparserctf5 (npm)
Malicious code in viktorparserctf6 (npm)
Malicious code in redis-cookie-parser (npm)
Malicious code in redis-request-parser (npm)
fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit)
Parse Server has a LiveQuery protected-field guard bypass via array-like logical operator value
Malicious code in tnaparserxml (npm)
Malicious code in tnaxmlparserctf (npm)
Malicious code in hfruitmaliciousxmlparser (npm)
Parse Server's OAuth2 adapter shares mutable state across providers via singleton instance
Malicious code in smart-parser (npm)
parse-server's file creation and deletion bypasses `readOnlyMasterKey` write restriction
ua-parser-js Regular Expression Denial of Service vulnerability
Malicious code in datetime-moment-parser (npm)
Malicious code in grgtgparse (npm)
ReDoS vulnerability in vue package that is exploitable through inefficient regex evaluation in the parseHTML function
Devalue is vulnerable to denial of service due to memory exhaustion in devalue.parse
Parse Server's Cloud Hooks and Cloud Jobs bypass `readOnlyMasterKey` write restriction
cookiejar Regular Expression Denial of Service via Cookie.parse function
Parser Server's streaming file download bypasses afterFind file trigger authorization
Malicious code in @asyncapi/protobuf-schema-parser (npm)
Malicious code in postcsssafeparsear (npm)
Nodemailer’s addressparser is vulnerable to DoS caused by recursive calls
Malicious code in @asyncapi/multi-parser (npm)
Malicious code in otetoparserlparser (npm)
Malicious code in cfruitmaliciousxmlparser (npm)
Malicious code in azure-dtdl-parser-samples-js-beta (npm)
Malicious code in body-parser-js (npm)
Malicious code in js-cookie-parser (npm)
Malicious code in efruitmaliciousxmlparser (npm)
Malicious code in ffruitmaliciousxmlparser (npm)
Malicious code in fruit-malicious-xml-parser (npm)
Malicious code in gfruitmaliciousxmlparser (npm)
Malicious code in ppppparserfruit (npm)
Malicious code in viktor-xml-parser (npm)
Malicious code in viktorparserctf (npm)
Malicious code in viktorparserctf3 (npm)
Malicious code in viktorparserctf8 (npm)
Malicious code in viktorparserctf9 (npm)
Malicious code in nginx-data-transfer-parser (npm)
Malicious code in url-w.parse (npm)
pnpm incorrectly parses tar archives relative to specification
Parse Server: File upload Content-Type override via extension mismatch
Parse Server has an MFA single-use token bypass via concurrent authData login requests
Malicious code in htlparsevr2 (npm)
Malicious code in elliptic-parser (npm)
Malicious code in ticket-parser2 (npm)
Malicious code in ticket-parser2-py3 (npm)
Malicious code in turbo-json-parser (npm)
Malicious code in @asyncapi/openapi-schema-parser (npm)
Malicious code in @asyncapi/parser (npm)
Malicious code in n8n-nodes-csv-parse (npm)
parse-server new anonymous user session acts as if it's created with password
flatted vulnerable to unbounded recursion DoS in parse() revive phase
Malicious code in boby_parser (npm)
Malicious code in loger-parser (npm)
Malicious code in @postman/csv-parse (npm)
Malicious code in katt-blueprint-parser (npm)
Malicious code in bridge-transaction-parser-hop400 (npm)
Malicious code in dfruitmaliciousxmlparser (npm)
Malicious code in koabodparser (npm)
Malicious code in cors-parser (npm)
Malicious code in glog-parser (npm)
file-type affected by infinite loop in ASF parser on malformed input with zero-size sub-header
Parse Server has a session field immutability bypass via falsy-value guard
fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters
parse-server has GraphQL complexity validator exponential fragment traversal DoS
Malicious code in eslint-parser-vue (npm)
Parse Server has a protected fields bypass via dot-notation in query and sort
parse-server has cloud function validator bypass via prototype chain traversal
Malicious code in fk-ua-parser (npm)
Malicious code in supxmlparser (npm)
Malicious code in @mparpaillon/connector-parse (npm)
Malicious code in https-parse (npm)
Malicious code in vite-plugin-parse-js (npm)
Malicious code in @shopify.com/shopifyql-parser (npm)
Malicious code in shopifyql-parser (npm)
Malicious code in string-parser-utils (npm)
Malicious code in remark-parse10 (npm)
Malicious code in vite-plugin-parse (npm)
Malicious code in jsonify-parser (npm)
Malicious code in ctfparsertna (npm)
Malicious code in viktorparserctf2 (npm)
Malicious code in cookie-parsers-env (npm)
Malicious code in toskasldfjaldf-parser (npm)
Malicious code in parsejson-pro (npm)
Malicious code in safe-json-parsex (npm)
Malicious code in json-parse-genie (npm)
Malicious code in parse-compat (npm)