Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68150: CWE-918: Server-Side Request Forgery (SSRF) in parse-community parse-server

0
High
VulnerabilityCVE-2025-68150cvecve-2025-68150cwe-918
Published: Tue Dec 16 2025 (12/16/2025, 18:15:09 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.2 and 9.1.1-alpha.1, the Instagram authentication adapter allows clients to specify a custom API URL via the `apiURL` parameter in `authData`. This enables SSRF attacks and possibly authentication bypass if malicious endpoints return fake responses to validate unauthorized users. This is fixed in versions 8.6.2 and 9.1.1-alpha.1 by hardcoding the Instagram Graph API URL `https://graph.instagram.com` and ignoring client-provided `apiURL` values. No known workarounds are available.

AI-Powered Analysis

AILast updated: 12/23/2025, 19:26:44 UTC

Technical Analysis

CVE-2025-68150 is a Server-Side Request Forgery (SSRF) vulnerability identified in the parse-community's parse-server, an open-source backend framework for Node.js environments. The vulnerability exists in the Instagram authentication adapter component of parse-server versions prior to 8.6.2 and 9.1.1-alpha.1. Specifically, the adapter allows clients to specify a custom API URL via the apiURL parameter within the authData payload. This design flaw permits attackers to manipulate the server into making HTTP requests to arbitrary URLs controlled by the attacker or internal network resources. SSRF vulnerabilities are dangerous because they can be leveraged to bypass network access controls, access internal services, or exfiltrate data. Additionally, in this case, the vulnerability may facilitate authentication bypass if the attacker-controlled endpoint returns responses that the server interprets as valid Instagram authentication tokens, thereby granting unauthorized access. The issue is remediated by hardcoding the Instagram Graph API URL (https://graph.instagram.com) in the authentication adapter and ignoring any client-supplied apiURL values, effectively eliminating the attack vector. The CVSS 4.0 base score is 8.3 (high severity), reflecting the network attack vector, low attack complexity, no privileges required beyond limited access, no user interaction, and high impact on confidentiality. No known exploits have been reported in the wild as of the publication date (December 16, 2025). The vulnerability affects any deployment of parse-server using the vulnerable versions, regardless of underlying infrastructure, making it broadly relevant to organizations leveraging this backend framework with Instagram authentication integration.

Potential Impact

For European organizations, the impact of CVE-2025-68150 can be significant, especially for those using parse-server as part of their backend infrastructure with Instagram authentication enabled. Successful exploitation could allow attackers to perform SSRF attacks, potentially accessing internal network resources that are otherwise inaccessible from the internet, such as internal APIs, databases, or metadata services in cloud environments. This could lead to data leakage, lateral movement within the network, or reconnaissance for further attacks. Moreover, the possibility of authentication bypass means attackers might gain unauthorized access to user accounts or sensitive application functions, undermining confidentiality and integrity. Given the widespread adoption of Node.js and open-source backend frameworks in European tech sectors, companies in industries such as e-commerce, social media, and digital services are particularly at risk. The vulnerability's ability to be exploited remotely without user interaction increases its threat level. Additionally, organizations subject to strict data protection regulations like GDPR must consider the compliance risks associated with potential data breaches stemming from this vulnerability.

Mitigation Recommendations

European organizations using parse-server with Instagram authentication should immediately upgrade to parse-server versions 8.6.2 or later, or 9.1.1-alpha.1 and above, where the vulnerability is fixed by hardcoding the Instagram Graph API URL. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should audit their parse-server configurations to ensure no custom apiURL parameters are accepted or processed. Implement network-level controls to restrict outbound HTTP requests from backend servers to only trusted endpoints, minimizing SSRF impact. Employ web application firewalls (WAFs) with SSRF detection rules to monitor and block suspicious request patterns. Conduct internal penetration testing focusing on SSRF vectors to identify any residual risks. Monitor logs for unusual outbound requests or authentication anomalies related to Instagram login flows. Finally, educate developers about secure handling of third-party authentication parameters to prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T20:13:34.486Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6941a4041a61eff6269a9348

Added to database: 12/16/2025, 6:25:08 PM

Last enriched: 12/23/2025, 7:26:44 PM

Last updated: 2/7/2026, 1:12:36 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats