Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27595: CWE-306: Missing Authentication for Critical Function in parse-community parse-dashboard

0
Critical
VulnerabilityCVE-2026-27595cvecve-2026-27595cwe-306
Published: Wed Feb 25 2026 (02/25/2026, 02:21:33 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-dashboard

Description

Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha.7, the AI Agent API endpoint (POST `/apps/:appId/agent`) has multiple security vulnerabilities that, when chained, allow unauthenticated remote attackers to perform arbitrary read and write operations against any connected Parse Server database using the master key. The agent feature is opt-in; dashboards without an agent config are not affected. The fix in version 9.0.0-alpha.8 adds authentication, CSRF validation, and per-app authorization middleware to the agent endpoint. Read-only users are restricted to the `readOnlyMasterKey` with write permissions stripped server-side. A cache key collision between master key and read-only master key was also corrected. As a workaround, remove or comment out the agent configuration block from your Parse Dashboard configuration.

AI-Powered Analysis

AILast updated: 02/25/2026, 03:26:55 UTC

Technical Analysis

Parse Dashboard is a management interface for Parse Server applications. Versions 7.3.0-alpha.42 through 9.0.0-alpha.7 contain a critical security flaw in the AI Agent API endpoint (POST `/apps/:appId/agent`). This endpoint lacks proper authentication controls, allowing unauthenticated remote attackers to chain multiple vulnerabilities to gain full read and write access to any connected Parse Server database by leveraging the master key. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function). Additionally, a cache key collision between the master key and the read-only master key allowed privilege escalation. The agent feature is optional and must be configured to be active; dashboards without this configuration are not vulnerable. The fix introduced in version 9.0.0-alpha.8 includes robust authentication mechanisms, CSRF protections, and per-application authorization middleware, restricting read-only users to a read-only master key with server-side write permission removal. The vulnerability has a CVSS 4.0 score of 9.9, indicating critical severity due to network exploitable, no authentication required, no user interaction, and high impact on confidentiality and integrity. No known exploits are reported in the wild yet, but the potential for severe damage is significant.

Potential Impact

This vulnerability allows unauthenticated attackers to fully compromise the confidentiality and integrity of Parse Server databases connected to vulnerable parse-dashboard instances. Attackers can read sensitive data, modify or delete records, and potentially disrupt application functionality. Because the master key is exposed through this flaw, attackers effectively gain administrative control over the backend data store. This can lead to data breaches, data loss, unauthorized data manipulation, and service disruption. Organizations relying on parse-dashboard for managing Parse Server apps, especially those with sensitive or critical data, face significant risk. The lack of authentication and ease of exploitation means attacks can be automated and widespread. The vulnerability also undermines trust in the application infrastructure and can have regulatory and compliance consequences if sensitive user data is exposed or altered.

Mitigation Recommendations

Organizations should immediately upgrade parse-dashboard to version 9.0.0-alpha.8 or later, which includes authentication, CSRF validation, and per-app authorization middleware to secure the AI Agent API endpoint. If upgrading is not immediately feasible, administrators should remove or comment out the agent configuration block from their parse-dashboard configuration to disable the vulnerable feature. Additionally, review and rotate master keys and read-only master keys to prevent misuse. Implement network-level protections such as firewall rules to restrict access to the dashboard interface to trusted IP addresses only. Monitor logs for unusual API activity targeting the `/apps/:appId/agent` endpoint. Conduct security audits to ensure no unauthorized access occurred prior to patching. Finally, educate developers and administrators about the risks of enabling optional features without proper security controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e6864b7ef31ef0bae9d01

Added to database: 2/25/2026, 3:11:32 AM

Last enriched: 2/25/2026, 3:26:55 AM

Last updated: 2/26/2026, 12:31:09 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats