Impact
Parse Server is vulnerable to NoSQL injection because the token field supplied to the password reset and email verification resend endpoints is accepted without type validation. Attackers can embed MongoDB query operators in this field to query the database and retrieve sensitive tokens. If the configuration emailVerifyTokenReuseIfValid is enabled, the attacker can additionally capture a valid email verification token and use it to confirm a user’s email address without accessing the user’s inbox. This flaw permits unauthenticated data disclosure and could facilitate further account compromise. The weakness correlates with CWE‑943, a NoSQL Injection vulnerability.
Affected Systems
The flaw affects any deployment of the parse‑community:parse‑server product running on Node.js with a MongoDB backend that has email verification or password reset enabled. Versions prior to 8.6.14 and 9.5‑alpha.1 are impacted. All installations using these versions should be examined.
Risk and Exploitability
The CVSS score of 8.7 categorizes the issue as high severity. The EPSS score is reported as less than 1 %, indicating that widespread exploitation is currently unlikely but still possible. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it via unauthenticated HTTP requests to the exposed endpoints, making the threat surface public and straightforward to discover.
OpenCVE Enrichment
Github GHSA