Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30848: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in parse-community parse-server

0
Medium
VulnerabilityCVE-2026-30848cvecve-2026-30848cwe-22
Published: Sat Mar 07 2026 (03/07/2026, 16:20:22 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.8 and 9.5.0-alpha.8, the PagesRouter static file serving route is vulnerable to a path traversal attack that allows unauthenticated reading of files outside the configured pagesPath directory. The boundary check uses a string prefix comparison without enforcing a directory separator boundary. An attacker can use path traversal sequences to access files in sibling directories whose names share the same prefix as the pages directory (e.g. pages-secret starts with pages). This issue has been patched in versions 8.6.8 and 9.5.0-alpha.8.

AI-Powered Analysis

AILast updated: 03/07/2026, 16:46:12 UTC

Technical Analysis

Parse Server, an open-source backend framework running on Node.js, includes a PagesRouter component responsible for serving static files from a configured pagesPath directory. In versions prior to 8.6.8 and 9.5.0-alpha.8, the PagesRouter's boundary check for restricting file access is flawed. Instead of properly validating directory traversal attempts by enforcing directory separator boundaries, it uses a simple string prefix comparison. This allows attackers to craft path traversal sequences that bypass the restriction by targeting sibling directories whose names share the same prefix as the intended pages directory (e.g., a directory named 'pages-secret' can be accessed when the intended directory is 'pages'). Consequently, unauthenticated attackers can read arbitrary files outside the designated pagesPath directory, potentially exposing sensitive configuration files, credentials, or other private data. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The issue has been addressed in parse-server versions 8.6.8 and 9.5.0-alpha.8 by correcting the boundary validation logic to properly enforce directory separator boundaries and prevent traversal outside the allowed directory. No known active exploits have been reported, but the vulnerability poses a significant risk to confidentiality if left unpatched.

Potential Impact

This vulnerability can lead to unauthorized disclosure of sensitive files on servers running vulnerable versions of parse-server. Attackers can read configuration files, environment variables, source code, or other sensitive data stored in sibling directories, potentially leading to further compromise or data leakage. Since the exploit requires no authentication or user interaction, it can be leveraged by remote attackers with network access to the parse-server instance. Organizations using parse-server as a backend for mobile or web applications may face confidentiality breaches, undermining user trust and regulatory compliance. The impact is primarily on confidentiality, with no direct integrity or availability effects reported. However, exposure of sensitive files could facilitate subsequent attacks such as credential theft or privilege escalation. The medium CVSS score (6.3) reflects the moderate ease of exploitation combined with the potential sensitivity of exposed data. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments with sensitive data or high-value targets.

Mitigation Recommendations

1. Upgrade parse-server to version 8.6.8 or later, or 9.5.0-alpha.8 or later, where the vulnerability is patched. 2. Review and restrict file system permissions for directories accessible by parse-server, ensuring that sensitive files are not stored in sibling directories with similar prefixes to the pagesPath directory. 3. Implement network-level access controls to limit exposure of parse-server instances to trusted networks or VPNs. 4. Monitor server logs for unusual file access patterns that may indicate exploitation attempts. 5. Employ web application firewalls (WAFs) with rules to detect and block path traversal payloads targeting parse-server endpoints. 6. Conduct regular security audits and penetration testing focusing on file access controls in backend services. 7. Educate development teams about secure coding practices related to path validation and directory traversal prevention. 8. If immediate upgrade is not feasible, consider temporarily disabling the PagesRouter static file serving feature or isolating it behind additional access controls until patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:27:35.341Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ac52cfc48b3f10ffafee90

Added to database: 3/7/2026, 4:31:11 PM

Last enriched: 3/7/2026, 4:46:12 PM

Last updated: 3/8/2026, 4:11:27 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses