Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68115: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in parse-community parse-server

0
Medium
VulnerabilityCVE-2025-68115cvecve-2025-68115cwe-79
Published: Tue Dec 16 2025 (12/16/2025, 00:56:23 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 8.6.1 and 9.1.0-alpha.3, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Parse Server's password reset and email verification HTML pages. The patch, available in versions 8.6.1 and 9.1.0-alpha.3, escapes user controlled values that are inserted into the HTML pages. No known workarounds are available.

AI-Powered Analysis

AILast updated: 12/16/2025, 01:30:48 UTC

Technical Analysis

CVE-2025-68115 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the parse-community's parse-server, an open-source backend framework running on Node.js. The vulnerability exists in the password reset and email verification HTML pages in versions prior to 8.6.1 and between 9.0.0 and 9.1.0-alpha.3. Specifically, the server fails to properly neutralize user-supplied input before embedding it into HTML responses, allowing attackers to inject malicious JavaScript code. When a victim interacts with a crafted URL or page, the injected script executes in their browser context, potentially enabling session hijacking, credential theft, or phishing attacks. The vulnerability requires no authentication but does require user interaction, such as clicking a malicious link. The CVSS 4.0 base score is 5.3, reflecting network attack vector, low complexity, no privileges required, but user interaction needed, and limited impacts on confidentiality and integrity. The vulnerability was patched by escaping user-controlled values in the affected HTML pages in parse-server versions 8.6.1 and 9.1.0-alpha.3. No workarounds are available, and no known exploits have been reported in the wild. Organizations deploying parse-server should upgrade promptly to the fixed versions to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to web applications using parse-server for backend services, especially those exposing password reset and email verification functionalities. Exploitation could lead to session hijacking, unauthorized actions performed on behalf of users, or phishing attacks leveraging the trusted domain. This could result in data breaches, loss of user trust, and regulatory compliance issues under GDPR if personal data is compromised. The impact on availability is negligible, but confidentiality and integrity could be affected to a limited extent. Organizations with customer-facing portals or internal tools using vulnerable parse-server versions are at risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks or future exploit development.

Mitigation Recommendations

European organizations should immediately upgrade parse-server instances to version 8.6.1 or later, or 9.1.0-alpha.3 or later, where the vulnerability is patched. In addition to patching, implement strict input validation and sanitization on all user inputs, especially those reflected in HTML responses. Deploy Content Security Policies (CSP) to restrict the execution of unauthorized scripts in browsers. Monitor web application logs for suspicious URL patterns or unexpected script injections. Educate users about phishing risks and encourage caution when clicking links in emails related to password resets or account verification. Consider implementing multi-factor authentication to reduce the impact of session hijacking. Regularly review and update dependencies and conduct security testing on web applications to detect similar vulnerabilities early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T16:16:22.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940b2a5d9bcdf3f3d15a315

Added to database: 12/16/2025, 1:15:17 AM

Last enriched: 12/16/2025, 1:30:48 AM

Last updated: 12/16/2025, 10:41:57 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats