Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround.
References
| Link | Resource |
|---|---|
| https://github.com/parse-community/parse-server/pull/10210 | Issue Tracking |
| https://github.com/parse-community/parse-server/pull/10211 | Issue Tracking |
| https://github.com/parse-community/parse-server/security/advisories/GHSA-4263-jgmp-7pf4 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-18 22:16
Updated : 2026-03-19 17:21
NVD link : CVE-2026-32886
Mitre link : CVE-2026-32886
CVE.ORG link : CVE-2026-32886
JSON object : View
Products Affected
parseplatform
- parse-server
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
