Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.2 and 9.1.1-alpha.1, the Instagram authentication adapter allows clients to specify a custom API URL via the `apiURL` parameter in `authData`. This enables SSRF attacks and possibly authentication bypass if malicious endpoints return fake responses to validate unauthorized users. This is fixed in versions 8.6.2 and 9.1.1-alpha.1 by hardcoding the Instagram Graph API URL `https://graph.instagram.com` and ignoring client-provided `apiURL` values. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/parse-community/parse-server/pull/9988 | Issue Tracking Patch |
| https://github.com/parse-community/parse-server/pull/9989 | Issue Tracking Patch |
| https://github.com/parse-community/parse-server/security/advisories/GHSA-3f5f-xgrj-97pf | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Jan 2026, 16:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.1.0:-:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha8:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha11:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha10:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.1.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha7:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha9:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.1.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.1.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.0.0:-:*:*:*:node.js:*:* cpe:2.3:a:parseplatform:parse-server:9.1.0:alpha4:*:*:*:node.js:*:* |
|
| References | () https://github.com/parse-community/parse-server/pull/9988 - Issue Tracking, Patch | |
| References | () https://github.com/parse-community/parse-server/pull/9989 - Issue Tracking, Patch | |
| References | () https://github.com/parse-community/parse-server/security/advisories/GHSA-3f5f-xgrj-97pf - Third Party Advisory | |
| First Time |
Parseplatform
Parseplatform parse-server |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
16 Dec 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-16 19:16
Updated : 2026-01-02 16:39
NVD link : CVE-2025-68150
Mitre link : CVE-2025-68150
CVE.ORG link : CVE-2025-68150
JSON object : View
Products Affected
parseplatform
- parse-server
CWE
CWE-918
Server-Side Request Forgery (SSRF)
