Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27595: CWE-306: Missing Authentication for Critical Function in parse-community parse-dashboard

0
Critical
VulnerabilityCVE-2026-27595cvecve-2026-27595cwe-306
Published: Wed Feb 25 2026 (02/25/2026, 02:21:33 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-dashboard

Description

Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha.7, the AI Agent API endpoint (POST `/apps/:appId/agent`) has multiple security vulnerabilities that, when chained, allow unauthenticated remote attackers to perform arbitrary read and write operations against any connected Parse Server database using the master key. The agent feature is opt-in; dashboards without an agent config are not affected. The fix in version 9.0.0-alpha.8 adds authentication, CSRF validation, and per-app authorization middleware to the agent endpoint. Read-only users are restricted to the `readOnlyMasterKey` with write permissions stripped server-side. A cache key collision between master key and read-only master key was also corrected. As a workaround, remove or comment out the agent configuration block from your Parse Dashboard configuration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:55:26 UTC

Technical Analysis

Parse Dashboard is a management interface for Parse Server applications, enabling administrators to monitor and control backend data. Versions 7.3.0-alpha.42 through 9.0.0-alpha.7 contain a critical security flaw in the AI Agent API endpoint (POST `/apps/:appId/agent`). This endpoint lacks proper authentication and authorization controls, allowing unauthenticated remote attackers to chain multiple vulnerabilities and leverage the master key to perform arbitrary read and write operations on any connected Parse Server database. The master key is a highly privileged credential that grants full access to the backend data store. The vulnerability stems from missing authentication (CWE-306) on a critical function, combined with insufficient CSRF protections and a cache key collision between the master key and read-only master key, which could allow privilege escalation or unauthorized write access. The agent feature is opt-in, so only dashboards configured with the agent are vulnerable. The fix introduced in version 9.0.0-alpha.8 implements authentication, CSRF validation, and per-app authorization middleware to restrict access appropriately. Additionally, read-only users are limited to a readOnlyMasterKey with write permissions removed server-side, mitigating risk. The vulnerability has a CVSS 4.0 base score of 9.9, reflecting its critical impact and ease of exploitation without authentication or user interaction. No known exploits are reported in the wild yet, but the severity and nature of the flaw make it a high priority for patching.

Potential Impact

This vulnerability allows unauthenticated attackers to gain full read and write access to any Parse Server database connected to a vulnerable parse-dashboard instance with the agent feature enabled. The attacker can exfiltrate sensitive data, modify or delete data, and potentially disrupt application availability or integrity. Since the master key provides unrestricted access, the compromise could lead to complete backend takeover, data breaches, and loss of trust. Organizations using parse-dashboard with the agent feature in affected versions are at risk of severe data compromise. The impact extends to any application relying on Parse Server for backend services, including mobile apps, web applications, and IoT solutions. The lack of authentication and CSRF protections increases the attack surface, enabling remote exploitation without user interaction. This could lead to widespread data leaks, unauthorized data manipulation, and service disruption, affecting business operations and regulatory compliance.

Mitigation Recommendations

Upgrade parse-dashboard to version 9.0.0-alpha.8 or later, which includes authentication, CSRF validation, and per-app authorization middleware for the agent endpoint. If immediate upgrade is not feasible, remove or comment out the agent configuration block from the parse-dashboard configuration to disable the vulnerable feature. Review and rotate master keys and readOnlyMasterKeys after patching to prevent misuse of compromised credentials. Implement network-level access controls to restrict dashboard access to trusted administrators and internal networks. Monitor logs for unusual API activity targeting the agent endpoint. Employ web application firewalls (WAFs) to detect and block unauthorized requests to the vulnerable endpoint. Conduct security audits of Parse Server deployments to ensure no other misconfigurations exist. Educate development and operations teams about the risks of enabling opt-in features without proper security controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e6864b7ef31ef0bae9d01

Added to database: 2/25/2026, 3:11:32 AM

Last enriched: 3/4/2026, 6:55:26 PM

Last updated: 4/12/2026, 10:01:40 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses