Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32728: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in parse-community parse-server

0
High
VulnerabilityCVE-2026-32728cvecve-2026-32728cwe-79
Published: Wed Mar 18 2026 (03/18/2026, 21:31:08 UTC)
Source: CVE Database V5
Vendor/Project: parse-community
Product: parse-server

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.15 and 8.6.41, an attacker who is allowed to upload files can bypass the file extension filter by appending a MIME parameter (e.g. `;charset=utf-8`) to the `Content-Type` header. This causes the extension validation to fail matching against the blocklist, allowing active content to be stored and served under the application's domain. In addition, certain XML-based file extensions that can render scripts in web browsers are not included in the default blocklist. This can lead to stored XSS attacks, compromising session tokens, user credentials, or other sensitive data accessible via the browser's local storage. The fix in versions 9.6.0-alpha.15 and 8.6.41 strips MIME parameters from the `Content-Type` header before validating the file extension against the blocklist. The default blocklist has also been extended to include additional XML-based extensions (`xsd`, `rng`, `rdf`, `rdf+xml`, `owl`, `mathml`, `mathml+xml`) that can render active content in web browsers. Note that the `fileUpload.fileExtensions` option is intended to be configured as an allowlist of file extensions that are valid for a specific application, not as a denylist. The default denylist is provided only as a basic default that covers most common problematic extensions. It is not intended to be an exhaustive list of all potentially dangerous extensions. Developers should not rely on the default value, as new extensions that can render active content in browsers might emerge in the future. As a workaround, configure the `fileUpload.fileExtensions` option to use an allowlist of only the file extensions that your application needs, rather than relying on the default blocklist.

AI-Powered Analysis

AILast updated: 03/18/2026, 22:12:55 UTC

Technical Analysis

CVE-2026-32728 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting parse-community's parse-server, an open-source backend platform for Node.js environments. Versions prior to 9.6.0-alpha.15 and 8.6.41 improperly validate uploaded file extensions by failing to strip MIME parameters appended to the Content-Type header (e.g., ';charset=utf-8'). This flaw allows attackers who have file upload permissions to circumvent the file extension blocklist, enabling them to upload files containing active content such as scripts. Furthermore, the default blocklist does not include certain XML-based file extensions (e.g., xsd, rng, rdf, owl, mathml) that can render executable scripts in browsers, further increasing the risk. When such malicious files are served from the application's domain, they can execute in the context of the victim's browser, potentially stealing session tokens, user credentials, or other sensitive data stored locally. The vulnerability does not require elevated privileges beyond file upload rights but does require user interaction to trigger the malicious script. The fix implemented in versions 9.6.0-alpha.15 and 8.6.41 involves stripping MIME parameters from the Content-Type header before validating the file extension and expanding the default blocklist to cover additional XML-based extensions. The advisory emphasizes that the default blocklist is not exhaustive and recommends that developers configure explicit allowlists tailored to their application's needs to minimize risk. No public exploits have been reported yet, but the vulnerability has a CVSS 4.0 base score of 8.3, indicating high severity due to network attack vector, low attack complexity, no privileges required beyond file upload, and partial impact on confidentiality and integrity.

Potential Impact

This vulnerability poses a significant risk to organizations using vulnerable versions of parse-server, especially those allowing user file uploads. Successful exploitation can lead to stored XSS attacks, enabling attackers to execute arbitrary scripts within the security context of the affected web application. This can result in theft of session cookies, user credentials, or other sensitive data accessible via browser local storage, potentially leading to account compromise, unauthorized access, and data breaches. The ability to bypass file extension filters increases the likelihood of malicious content being uploaded and served. The impact extends to the integrity and confidentiality of user data and can undermine user trust and compliance with data protection regulations. Since parse-server is used globally in various industries, including startups and enterprises deploying custom backends, the scope of affected systems is broad. The vulnerability requires only file upload permissions and user interaction, making it relatively easy to exploit in environments where users can upload files. The absence of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation to prevent future attacks.

Mitigation Recommendations

Organizations should immediately upgrade parse-server to versions 9.6.0-alpha.15 or 8.6.41 or later where the vulnerability is fixed. Until upgrades are applied, administrators should implement strict allowlists for file uploads by configuring the fileUpload.fileExtensions option to explicitly permit only necessary file types, avoiding reliance on the default blocklist. Additionally, validate and sanitize all user-uploaded content on the server side, ensuring that MIME parameters are stripped or normalized before file extension validation. Employ Content Security Policy (CSP) headers to restrict script execution and reduce the impact of potential XSS attacks. Monitor file upload logs for suspicious activity and restrict file upload permissions to trusted users only. Regularly review and update the blocklist to include emerging file extensions capable of rendering active content. Conduct security testing focused on file upload functionality to detect similar bypasses. Educate developers about the risks of relying on default blocklists and the importance of secure configuration. Implement multi-factor authentication and session management best practices to mitigate the impact of stolen credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.626Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2001771bdb1749c8931a

Added to database: 3/18/2026, 9:58:25 PM

Last enriched: 3/18/2026, 10:12:55 PM

Last updated: 3/19/2026, 2:02:03 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses