Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30939: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in parse-community parse-server

0
High
VulnerabilityCVE-2026-30939cvecve-2026-30939cwe-1321
Published: Tue Mar 10 2026 (03/10/2026, 16:37:50 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13 and 9.5.1-alpha.2, an unauthenticated attacker can crash the Parse Server process by calling a Cloud Function endpoint with a prototype property name as the function name. The server recurses infinitely, causing a call stack size error that terminates the process. Other prototype property names bypass Cloud Function dispatch validation and return HTTP 200 responses, even though no such Cloud Functions are defined. The same applies to dot-notation traversal. All Parse Server deployments that expose the Cloud Function endpoint are affected. This vulnerability is fixed in 8.6.13 and 9.5.1-alpha.2.

AI-Powered Analysis

AILast updated: 03/10/2026, 17:07:01 UTC

Technical Analysis

The vulnerability identified as CVE-2026-30939 affects parse-community's parse-server, an open-source backend framework for Node.js environments. The flaw is categorized under CWE-1321, relating to improper control of object prototype attribute modifications, commonly known as prototype pollution. In affected versions prior to 8.6.13 and between 9.0.0 and 9.5.1-alpha.2, an attacker can send specially crafted requests to the Cloud Function endpoint using prototype property names as the function name. This triggers infinite recursion within the server's function dispatch mechanism, leading to a call stack overflow and crashing the parse-server process. Furthermore, certain prototype property names bypass the Cloud Function dispatch validation, causing the server to respond with HTTP 200 OK even though no legitimate Cloud Function exists for those names. This behavior can mislead clients and potentially be leveraged in complex attack chains. The vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker with network access to the Cloud Function endpoint. The root cause lies in inadequate validation and sanitization of input function names, allowing prototype pollution to interfere with the server's internal logic. The issue is resolved in parse-server versions 8.6.13 and 9.5.1-alpha.2 by properly validating function names and preventing prototype property names from being processed. No known exploits are currently reported in the wild, but the high CVSS score of 8.8 reflects the significant risk of denial-of-service attacks against exposed parse-server instances.

Potential Impact

This vulnerability primarily enables denial-of-service (DoS) attacks by crashing the parse-server process, resulting in service unavailability. Organizations relying on parse-server for backend services risk disruption of critical applications, potentially affecting user experience and business operations. Since the attack requires no authentication and can be performed remotely, any exposed Cloud Function endpoint is vulnerable to indiscriminate or targeted DoS attempts. This can lead to downtime, loss of revenue, and damage to reputation. Additionally, the bypass of Cloud Function dispatch validation may confuse monitoring systems or be used in more complex attack scenarios, though no direct code execution or data breach is indicated. The wide adoption of parse-server in various industries, especially startups and enterprises using Node.js backends, increases the scope of impact. Without timely patching, attackers can exploit this vulnerability to degrade service reliability and availability at scale.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 8.6.13 or later, or 9.5.1-alpha.2 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, implement network-level protections such as restricting access to Cloud Function endpoints via firewalls or API gateways to trusted IP addresses only. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) that can detect and block requests containing suspicious prototype property names. Review and harden Cloud Function endpoint configurations to reject unexpected or malformed function names. Implement monitoring and alerting for unusual request patterns targeting Cloud Function endpoints to detect potential exploitation attempts early. Conduct thorough testing after patching to ensure no residual issues remain. Finally, maintain an inventory of parse-server deployments and ensure all instances are updated promptly to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.978Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b04b8cea502d3aa873ba93

Added to database: 3/10/2026, 4:49:16 PM

Last enriched: 3/10/2026, 5:07:01 PM

Last updated: 3/14/2026, 12:48:27 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses