We found results for “”
CVE-2025-53364
Good to know:
Date: July 10, 2025
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Starting in 5.3.0 and before 7.5.3 and 8.2.2, the Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface. This vulnerability is fixed in 7.5.3 and 8.2.2.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE-497Top Fix
Upgrade Version
Upgrade to version parse-server - 7.5.3;parse-server - 8.2.2;parse-server - 8.2.2;https://github.com/parse-community/parse-server.git - 7.5.3;https://github.com/parse-community/parse-server.git - 8.2.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


