Home

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-18 | Updated 2026-03-19 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Product status

>= 9.0.0, < 9.6.0-alpha.24
affected

< 8.6.47
affected

References

github.com/...server/security/advisories/GHSA-4263-jgmp-7pf4

github.com/parse-community/parse-server/pull/10210

github.com/parse-community/parse-server/pull/10211

cve.org (CVE-2026-32886)

nvd.nist.gov (CVE-2026-32886)

Download JSON