An express module providing a Parse-compatible API server
80%
Total Score
84
100
100
65
50
| Title | Versions | Severity |
|---|---|---|
CVE-2026-27804 New parse-server is vulnerable to Use of a Broken or Risky Cryptographic Algorithm in versions 9.0.0 - 9.3.1-alpha.3 and 0.0.0 - 8.6.2. | 0.0.0 - 8.6.29.0.0 - 9.3.1-alpha.3 | Critical |
AIKIDO-2026-10179 Pre-CVE Found by Aikido Intel before public disclosure or CVE publication. parse-server is vulnerable to Generation of Error Message Containing Sensitive Information in versions 6.0.0 - 9.1.1. | 6.0.0 - 9.1.1 | Low |
CVE-2025-68150 parse-server is vulnerable to Server-Side Request Forgery (SSRF) in versions 0.0.0 - 8.6.2 and 9.0.0 - 9.1.1-alpha.1. | 0.0.0 - 8.6.29.0.0 - 9.1.1-alpha.1 | High |
CVE-2025-68115 parse-server is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in versions 0.0.0 - 8.6.1 and 9.0.0 - 9.1.0-alpha.3. | 0.0.0 - 8.6.19.0.0 - 9.1.0-alpha.3 | Medium |
AIKIDO-2025-10887 Pre-CVE Found by Aikido Intel before public disclosure or CVE publication. parse-server is vulnerable to Generation of Error Message Containing Sensitive Information in versions 2.2.8 - 8.4.0. | 2.2.8 - 8.4.0 | Low |
| Dependency | Last Release | Score |
|---|---|---|
ws Version 8.18.2 | — | — |
tv4 Version 1.3.0 | — | — |
cors Version 2.8.6 | — | — |
mime Version 4.0.7 | — | — |
uuid Version 11.1.0 | — | — |
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant