Parse Javascript SDK vulnerable to prototype pollution in `Parse.Object` and internal APIs
Moderate severity
GitHub Reviewed
Published
Oct 14, 2025
in
parse-community/Parse-SDK-JS
•
Updated Oct 14, 2025
Description
Published by the National Vulnerability Database
Oct 14, 2025
Published to the GitHub Advisory Database
Oct 14, 2025
Reviewed
Oct 14, 2025
Last updated
Oct 14, 2025
Summary
Prototype pollution capabilities on various APIs.
Details
Injection of malicious payload allows attacker to remotely execute arbitrary code.
Parse.Object
and internal APIs are affected, specifically:ParseObject.fromJSON
ParseObject.pin
ParseObject.registerSubclass
ObjectStateMutations
(internal)encode
/decode
(internal)PoC
Demonstrative tests added as part of the fix.
References
References