Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2025-21001 | Parse Server exposes the data schema via GraphQL API | 
|  Github GHSA | GHSA-48q3-prgv-gm4w | Parse Server exposes the data schema via GraphQL API | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Thu, 10 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 10 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Starting in 5.3.0 and before 7.5.3 and 8.2.2, the Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface. This vulnerability is fixed in 7.5.3 and 8.2.2. | |
| Title | Parse Server exposes the data schema via GraphQL API | |
| Weaknesses | CWE-497 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-10T15:52:47.570Z
Reserved: 2025-06-27T12:57:16.121Z
Link: CVE-2025-53364
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-10T15:52:44.663Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-10T16:15:24.777
Modified: 2025-07-15T13:24:41.097
Link: CVE-2025-53364
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-07-13T11:06:29Z