← Back to CVEs
CVE-2025-62374
MEDIUM6.4
Description
Parse Javascript SDK provides access to the powerful Parse Server backend from your JavaScript app. Prior to 7.0.0, injection of malicious payload allows attacker to remotely execute arbitrary code. ParseObject.fromJSON, ParseObject.pin, ParseObject.registerSubclass, ObjectStateMutations (internal), and encode/decode (internal) are affected. This vulnerability is fixed in 7.0.0.
CVE Details
CVSS v3.1 Score6.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published10/14/2025
Last Modified10/16/2025
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-1321
References
https://github.com/parse-community/Parse-SDK-JS/commit/00973987f361368659c0c4dbf669f3897520b132(security-advisories@github.com)
https://github.com/parse-community/Parse-SDK-JS/pull/2749(security-advisories@github.com)
https://github.com/parse-community/Parse-SDK-JS/releases/tag/7.0.0-alpha.1(security-advisories@github.com)
https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-9f2h-7v79-mxw3(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.