Impact
The vulnerability allows unauthenticated attackers to chain multiple flaws in the AI Agent API endpoint of Parse Dashboard to read or modify any data stored in a connected Parse Server database that is protected by the master key. This does not grant code execution, but it does compromise database confidentiality and integrity, enabling attackers to extract, tamper with, or delete data without authorization.
Affected Systems
The issue exists in Parse Dashboard distributions from version 7.3.0-alpha.42 through 9.0.0-alpha.7. Only dashboards that enable the optional agent configuration are affected; dashboards without an agent block remain unaffected. The fix was applied in version 9.0.0-alpha.8 and later, which introduces authentication and per‑app authorization to the agent endpoint.
Risk and Exploitability
The vulnerability has a CVSS score of 9.9, indicating critical severity. The EPSS score is less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting exploitation likelihood is low, but the underlying impact is high. Attackers would need to send an unauthenticated POST request to the /apps/:appId/agent endpoint on a dashboard that has the agent enabled. If successful, they could read or write any database record via the master key.
OpenCVE Enrichment
Github GHSA