CVE-2025-67727

Parse Server is an open source backend that can be deployed to any infrastructure that runs Node.js. In versions prior to 8.6.0-alpha.2, a GitHub CI workflow is triggered in a way that grants the GitHub Actions workflow elevated permissions, giving it access to GitHub secrets and write permissions which are defined in the workflow. Code from a fork or lifecycle scripts is potentially included. Only the repository's CI/CD infrastructure is affected, including any public GitHub forks with GitHub Actions enabled. This issue is fixed version 8.6.0-alpha.2 and commits 6b9f896 and e3d27fe.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:8.6.0:alpha1:*:*:*:node.js:*:*

History

No history.

Information

Published : 2025-12-12 07:15

Updated : 2025-12-22 18:59


NVD link : CVE-2025-67727

Mitre link : CVE-2025-67727

CVE.ORG link : CVE-2025-67727


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-269

Improper Privilege Management