Home

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.73 and 9.7.1-alpha.4, a file can be uploaded with a filename extension that passes the file extension allowlist (e.g., .txt) but with a Content-Type header that differs from the extension (e.g., text/html). The Content-Type is passed to the storage adapter without consistency validation. Storage adapters that store and serve the provided Content-Type (such as S3 or GCS) serve the file with the mismatched Content-Type. The default GridFS adapter is not affected because it derives Content-Type from the filename at serving time. This vulnerability is fixed in 8.6.73 and 9.7.1-alpha.4.

PUBLISHED Reserved 2026-04-01 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




LOW: 2.1CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-436: Interpretation Conflict

Product status

>= 9.0.0, < 9.7.1-alpha.4
affected

< 8.6.73
affected

References

github.com/...server/security/advisories/GHSA-vr5f-2r24-w5hc

github.com/parse-community/parse-server/pull/10383

github.com/parse-community/parse-server/pull/10384

cve.org (CVE-2026-35200)

nvd.nist.gov (CVE-2026-35200)

Download JSON