Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67727: CWE-94: Improper Control of Generation of Code ('Code Injection') in parse-community parse-server

0
Medium
VulnerabilityCVE-2025-67727cvecve-2025-67727cwe-94cwe-269
Published: Fri Dec 12 2025 (12/12/2025, 06:35:52 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that runs Node.js. In versions prior to 8.6.0-alpha.2, a GitHub CI workflow is triggered in a way that grants the GitHub Actions workflow elevated permissions, giving it access to GitHub secrets and write permissions which are defined in the workflow. Code from a fork or lifecycle scripts is potentially included. Only the repository's CI/CD infrastructure is affected, including any public GitHub forks with GitHub Actions enabled. This issue is fixed version 8.6.0-alpha.2 and commits 6b9f896 and e3d27fe.

AI-Powered Analysis

AILast updated: 12/19/2025, 08:30:12 UTC

Technical Analysis

CVE-2025-67727 is a vulnerability identified in the parse-community parse-server project, specifically affecting versions prior to 8.6.0-alpha.2. The root cause lies in the GitHub Actions continuous integration (CI) workflows configured in the repository. These workflows are triggered in a manner that inadvertently grants elevated permissions, including access to GitHub secrets and write permissions defined in the workflow configuration. The vulnerability arises because code from untrusted sources, such as public forks or lifecycle scripts, can be included and executed within these workflows. This improper control of code generation (CWE-94) allows potential code injection attacks within the CI/CD pipeline. The impact is confined to the repository's CI/CD infrastructure and does not directly affect the parse-server runtime environment. The vulnerability does not require authentication or user interaction and can be exploited remotely via GitHub Actions triggers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality and integrity. The issue was reserved and published in December 2025 and has been addressed in parse-server version 8.6.0-alpha.2 with relevant commits. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, the primary impact of this vulnerability is on the security of their CI/CD pipelines if they use parse-server repositories with GitHub Actions enabled. Unauthorized code execution within CI workflows can lead to leakage of sensitive GitHub secrets such as tokens, credentials, or deployment keys, potentially enabling further compromise of internal systems or cloud infrastructure. This could result in unauthorized code deployments, data exfiltration, or lateral movement within the organization's environment. Although the vulnerability does not affect the runtime parse-server product directly, the CI/CD compromise can indirectly impact application integrity and availability. Organizations relying on public forks or collaborative development models are at higher risk, especially if they do not restrict workflow permissions or monitor CI activity closely. The medium severity rating indicates a significant but not critical risk, emphasizing the need for timely patching and workflow hardening to prevent exploitation.

Mitigation Recommendations

1. Upgrade parse-server to version 8.6.0-alpha.2 or later to incorporate the fix for this vulnerability. 2. Review and restrict GitHub Actions workflow permissions by using the principle of least privilege, limiting access to secrets and write permissions only to trusted workflows. 3. Disable or carefully control GitHub Actions on public forks to prevent untrusted code execution. 4. Implement branch protection rules and require pull request reviews before merging changes to workflows. 5. Monitor GitHub Actions logs and audit workflow runs for suspicious activity or unexpected permission escalations. 6. Use GitHub's security features such as 'workflow permissions' settings and 'secrets scanning' to detect and prevent secret leaks. 7. Educate developers and DevOps teams about the risks of CI/CD pipeline vulnerabilities and secure workflow configuration best practices. 8. Consider isolating CI/CD environments and secrets management using dedicated service accounts with minimal privileges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-10T19:25:20.819Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693bbde4e6d9263eb3549393

Added to database: 12/12/2025, 7:01:56 AM

Last enriched: 12/19/2025, 8:30:12 AM

Last updated: 2/7/2026, 6:48:36 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats