Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7291 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.3 or 4.10.20, a compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option. This issue has been patched in versions 5.3.3 and 4.10.20. There are no known workarounds. |
Github GHSA |
GHSA-93vw-8fm5-p2jf | Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks |
Wed, 23 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T16:38:21.463Z
Reserved: 2022-09-30T00:00:00.000Z
Link: CVE-2022-41879
Updated: 2024-08-03T12:56:38.306Z
Status : Modified
Published: 2022-11-10T21:15:11.087
Modified: 2024-11-21T07:23:58.553
Link: CVE-2022-41879
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA