Parse Javascript SDK provides access to the powerful Parse Server backend from your JavaScript app. Prior to 7.0.0, injection of malicious payload allows attacker to remotely execute arbitrary code. ParseObject.fromJSON, ParseObject.pin, ParseObject.registerSubclass, ObjectStateMutations (internal), and encode/decode (internal) are affected. This vulnerability is fixed in 7.0.0.
History

Tue, 14 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Description Parse Javascript SDK provides access to the powerful Parse Server backend from your JavaScript app. Prior to 7.0.0, injection of malicious payload allows attacker to remotely execute arbitrary code. ParseObject.fromJSON, ParseObject.pin, ParseObject.registerSubclass, ObjectStateMutations (internal), and encode/decode (internal) are affected. This vulnerability is fixed in 7.0.0.
Title Parse Javascript SDK vulnerable to prototype pollution in `Parse.Object` and internal APIs
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-14T20:29:30.809Z

Reserved: 2025-10-10T14:22:48.204Z

Link: CVE-2025-62374

cve-icon Vulnrichment

Updated: 2025-10-14T20:29:27.258Z

cve-icon NVD

Status : Received

Published: 2025-10-14T20:15:53.550

Modified: 2025-10-14T20:15:53.550

Link: CVE-2025-62374

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.