Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30948: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in parse-community parse-server

0
High
VulnerabilityCVE-2026-30948cvecve-2026-30948cwe-79
Published: Tue Mar 10 2026 (03/10/2026, 20:18:23 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.4 and 8.6.17, a stored cross-site scripting (XSS) vulnerability allows any authenticated user to upload an SVG file containing JavaScript. The file is served inline with Content-Type: image/svg+xml and without protective headers, causing the browser to execute embedded scripts in the Parse Server origin. This can be exploited to steal session tokens from localStorage and achieve account takeover. The default fileExtensions option blocks HTML file extensions but does not block SVG, which is a well-known XSS vector. All Parse Server deployments where file upload is enabled for authenticated users (the default) are affected. This vulnerability is fixed in 9.5.2-alpha.4 and 8.6.17.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 20:44:44 UTC

Technical Analysis

CVE-2026-30948 is a stored cross-site scripting (XSS) vulnerability identified in the parse-community's parse-server, an open-source backend platform running on Node.js. The flaw exists in versions >= 9.0.0 and < 9.5.2-alpha.4, and versions < 8.6.17. It arises because authenticated users can upload SVG files containing embedded JavaScript code. These SVG files are served inline with the MIME type image/svg+xml without any security headers such as Content-Security-Policy or X-Content-Type-Options. As a result, when a victim user accesses the malicious SVG, the browser executes the embedded JavaScript in the context of the parse-server origin. This can lead to theft of session tokens stored in localStorage, enabling attackers to hijack user sessions and perform account takeover. The vulnerability stems from the default fileExtensions configuration, which blocks HTML uploads but does not restrict SVG files, a known vector for XSS attacks. Since file upload is enabled by default for authenticated users, all such deployments are vulnerable unless patched. The vulnerability does not require elevated privileges beyond authentication and does not require user interaction beyond viewing the malicious SVG. The CVSS 4.0 base score is 8.3, reflecting network attack vector, low attack complexity, no privileges required beyond authentication, partial user interaction, and high impact on confidentiality. No public exploits have been reported yet. The issue was reserved on March 7, 2026, and published on March 10, 2026. The fix is included in parse-server versions 9.5.2-alpha.4 and 8.6.17 and later.

Potential Impact

This vulnerability poses a significant risk to organizations using parse-server as their backend infrastructure, especially those allowing authenticated users to upload files. Successful exploitation can lead to session token theft and user account takeover, compromising user data confidentiality and integrity. Attackers could impersonate legitimate users, escalate privileges, or perform unauthorized actions within the application. Since the vulnerability affects all deployments with default file upload settings, the attack surface is broad. The impact extends to any web application relying on parse-server for user authentication and data management, potentially affecting customer trust and regulatory compliance. Additionally, compromised accounts could be leveraged for further attacks within the organization’s environment. The lack of protective headers and the inline serving of SVG files exacerbate the risk. Although no known exploits are currently in the wild, the ease of exploitation and high impact make this a critical issue to address promptly.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to version 9.5.2-alpha.4, 8.6.17, or later where the vulnerability is patched. Until upgrades can be applied, administrators should disable file uploads for authenticated users or restrict allowed file types to exclude SVG files. Implementing strict Content Security Policy (CSP) headers that disallow inline scripts and restrict script sources can mitigate exploitation risk. Additionally, configuring the server to serve SVG files with the Content-Disposition header set to attachment rather than inline can prevent automatic script execution. Employing X-Content-Type-Options: nosniff headers can also reduce risk by preventing MIME type sniffing. Regularly auditing file upload functionality and monitoring logs for suspicious SVG uploads is recommended. Developers should review and harden file validation logic to reject potentially dangerous file types and sanitize all user-supplied content. Finally, educating users about the risks of clicking on untrusted links or files within the application can reduce the likelihood of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b07f3e2f860ef943b515b6

Added to database: 3/10/2026, 8:29:50 PM

Last enriched: 3/10/2026, 8:44:44 PM

Last updated: 4/24/2026, 11:19:06 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses