Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2025-30168 First vendor Publication 2025-03-21
Vendor Cve Last vendor Modification 2025-03-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 7.5.2 and 8.0.2, the 3rd party authentication handling of Parse Server allows the authentication credentials of some specific authentication providers to be used across multiple Parse Server apps. For example, if a user signed up using the same authentication provider in two unrelated Parse Server apps, the credentials stored by one app can be used to authenticate the same user in the other app. Note that this only affects Parse Server apps that specifically use an affected 3rd party authentication provider for user authentication, for example by setting the Parse Server option auth to configure a Parse Server authentication adapter. The fix of this vulnerability requires to upgrade Parse Server to a version that includes the bug fix, as well as upgrade the client app to send a secure payload, which is different from the previous insecure payload. This vulnerability is fixed in 7.5.2 and 8.0.2.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30168

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

Sources (Detail)

https://docs.parseplatform.org/parse-server/guide/#oauth-and-3rd-party-authen...
https://github.com/parse-community/parse-server/commit/2ff9c71030bce3aada0a00...
https://github.com/parse-community/parse-server/commit/5ef0440c8e763854e62341...
https://github.com/parse-community/parse-server/pull/9667
https://github.com/parse-community/parse-server/pull/9668
https://github.com/parse-community/parse-server/security/advisories/GHSA-837q...
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-03-21 17:20:32
  • First insertion