Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-34373
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-31 Mar, 2026 | 14:38
Updated At-31 Mar, 2026 | 17:23
Rejected At-
▼CVE Numbering Authority (CNA)
Parse Server: GraphQL API endpoint ignores CORS origin restriction

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.66 and 9.7.0-alpha.10, the GraphQL API endpoint does not respect the allowOrigin server option and unconditionally allows cross-origin requests from any website. This bypasses origin restrictions that operators configure to control which websites can interact with the Parse Server API. The REST API correctly enforces the configured allowOrigin restriction. This issue has been patched in versions 8.6.66 and 9.7.0-alpha.10.

Affected Products
Vendor
parse-community
Product
parse-server
Versions
Affected
  • < 8.6.66
  • >= 9.0.0, < 9.7.0-alpha.10
Problem Types
TypeCWE IDDescription
CWECWE-346CWE-346: Origin Validation Error
Type: CWE
CWE ID: CWE-346
Description: CWE-346: Origin Validation Error
Metrics
VersionBase scoreBase severityVector
4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/parse-community/parse-server/security/advisories/GHSA-q3p6-g7c4-829c
x_refsource_CONFIRM
https://github.com/parse-community/parse-server/pull/10334
x_refsource_MISC
https://github.com/parse-community/parse-server/pull/10335
x_refsource_MISC
https://github.com/parse-community/parse-server/commit/0347641507891d0013ec57f7c10f012064f41263
x_refsource_MISC
https://github.com/parse-community/parse-server/commit/4dd0d3d8be1c39664c74ad10bb0abaa76bc41203
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/security/advisories/GHSA-q3p6-g7c4-829c
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/parse-community/parse-server/pull/10334
Resource:
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/pull/10335
Resource:
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/commit/0347641507891d0013ec57f7c10f012064f41263
Resource:
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/commit/4dd0d3d8be1c39664c74ad10bb0abaa76bc41203
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found