Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-34373
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-31 Mar, 2026 | 15:16
Updated At-02 Apr, 2026 | 18:40

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.66 and 9.7.0-alpha.10, the GraphQL API endpoint does not respect the allowOrigin server option and unconditionally allows cross-origin requests from any website. This bypasses origin restrictions that operators configure to control which websites can interact with the Parse Server API. The REST API correctly enforces the configured allowOrigin restriction. This issue has been patched in versions 8.6.66 and 9.7.0-alpha.10.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CPE Matches

parseplatform
parseplatform
>>parse-server>>Versions from 3.5.0(inclusive) to 8.6.66(exclusive)
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>Versions from 9.0.0(inclusive) to 9.7.0(exclusive)
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha1:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha2:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha3:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha4:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha5:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha6:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha7:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha8:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>9.7.0
cpe:2.3:a:parseplatform:parse-server:9.7.0:alpha9:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-346Primarysecurity-advisories@github.com
CWE ID: CWE-346
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/parse-community/parse-server/commit/0347641507891d0013ec57f7c10f012064f41263security-advisories@github.com
Patch
https://github.com/parse-community/parse-server/commit/4dd0d3d8be1c39664c74ad10bb0abaa76bc41203security-advisories@github.com
Patch
https://github.com/parse-community/parse-server/pull/10334security-advisories@github.com
Issue Tracking
Patch
https://github.com/parse-community/parse-server/pull/10335security-advisories@github.com
Issue Tracking
Patch
https://github.com/parse-community/parse-server/security/advisories/GHSA-q3p6-g7c4-829csecurity-advisories@github.com
Patch
Vendor Advisory
Hyperlink: https://github.com/parse-community/parse-server/commit/0347641507891d0013ec57f7c10f012064f41263
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/parse-community/parse-server/commit/4dd0d3d8be1c39664c74ad10bb0abaa76bc41203
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/parse-community/parse-server/pull/10334
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/parse-community/parse-server/pull/10335
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/parse-community/parse-server/security/advisories/GHSA-q3p6-g7c4-829c
Source: security-advisories@github.com
Resource:
Patch
Vendor Advisory
Change History
0Changes found

Details not found