Impact
Parse Dashboard versions 7.3.0‑alpha.42 through 9.0.0‑alpha.7 expose the AI Agent API endpoint (POST /apps/:appId/agent) without CSRF protection. An attacker can host a malicious web page that, when visited by an authenticated dashboard user, causes the victim’s browser to issue agent requests using the user’s session cookie. Because the agent endpoint can trigger privileged actions or execute code in the Parse Server environment, this flaw enables the attacker to compromise confidentiality, integrity, or availability of the hosted application. The vulnerability is classified as a Cross‑Site Request Forgery (CWE‑352) and carries a CVSS base score of 8.3.
Affected Systems
The affected product is Parse Dashboard from the parse‑community vendor. All releases from 7.3.0‑alpha.42 up to and including 9.0.0‑alpha.7 contain the flaw. Updates beginning with 9.0.0‑alpha.8 add CSRF middleware and are no longer susceptible.
Risk and Exploitability
The CVSS score of 8.3 indicates high impact, but the EPSS score is reported as less than 1 %, suggesting a low current exploitation probability. The flaw is not listed in the CISA KEV catalog. Exploitation requires an authenticated user to interact with a crafted page, making it a user‑interaction CSRF scenario that can result in remote code execution or other high‑impact actions on the Parse Server.
OpenCVE Enrichment
Github GHSA