Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30848: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-30848cvecve-2026-30848cwe-22
Published: Sat Mar 07 2026 (03/07/2026, 16:20:22 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.8 and 9.5.0-alpha.8, the PagesRouter static file serving route is vulnerable to a path traversal attack that allows unauthenticated reading of files outside the configured pagesPath directory. The boundary check uses a string prefix comparison without enforcing a directory separator boundary. An attacker can use path traversal sequences to access files in sibling directories whose names share the same prefix as the pages directory (e.g. pages-secret starts with pages). This issue has been patched in versions 8.6.8 and 9.5.0-alpha.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:59:13 UTC

Technical Analysis

Parse Server is an open-source backend framework that runs on Node.js, widely used for building applications with a flexible backend. The vulnerability identified as CVE-2026-30848 affects the PagesRouter component responsible for serving static files. The root cause is an improper limitation of pathname to a restricted directory (CWE-22), specifically in how the server validates requested file paths. Instead of strictly enforcing directory boundaries, the check relies on a string prefix comparison to ensure requested files reside within the configured pagesPath directory. However, this approach fails to consider directory separators, allowing attackers to craft path traversal sequences that access files in sibling directories whose names share the same prefix as the pages directory (e.g., a directory named pages-secret). This flaw enables unauthenticated attackers to read arbitrary files outside the intended directory, potentially exposing sensitive information. The vulnerability does not require any privileges or user interaction, increasing its risk. The issue was addressed and patched in parse-server versions 8.6.8 and 9.5.0-alpha.8 by correcting the boundary check to properly enforce directory separator boundaries and prevent traversal. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation warrant prompt attention.

Potential Impact

The vulnerability allows unauthenticated attackers to read arbitrary files on servers running vulnerable versions of parse-server. This can lead to exposure of sensitive configuration files, credentials, source code, or other confidential data stored outside the intended pagesPath directory. Such information disclosure can facilitate further attacks, including privilege escalation, lateral movement, or data breaches. Since parse-server is used globally to power backend services, organizations relying on vulnerable versions risk unauthorized data exposure. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the threat landscape. While the vulnerability does not directly allow code execution or denial of service, the confidentiality impact is significant. Organizations with sensitive data hosted on parse-server instances are particularly at risk, especially if file system permissions are lax or sensitive files reside near the pages directory. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 8.6.8 or later, or 9.5.0-alpha.8 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement strict access controls on the server filesystem to restrict read permissions to only necessary directories and files, minimizing the impact of potential traversal. Additionally, configure web server or reverse proxy rules to limit access to sensitive directories and files outside the intended pagesPath. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules to detect and block path traversal patterns in HTTP requests. Conduct thorough audits of directory structures to avoid sibling directories with similar prefixes that could be exploited. Monitor logs for suspicious requests containing traversal sequences. Finally, review and harden file serving logic in custom deployments to ensure proper boundary checks that enforce directory separators and canonical path validation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:27:35.341Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ac52cfc48b3f10ffafee90

Added to database: 3/7/2026, 4:31:11 PM

Last enriched: 3/14/2026, 7:59:13 PM

Last updated: 4/21/2026, 11:53:22 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses