Server-Side Request Forgery Vulnerability in Parse Server by Parse Community
CVE-2025-64430

7.5HIGH

Key Information:

Vendor
CVE Published:
7 November 2025

What is CVE-2025-64430?

Parse Server, an open-source backend framework, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability that arises during file uploads. This issue affects versions 4.2.0 through 7.5.3 and 8.0.0 through 8.3.1-alpha.1. When an attacker uploads a file with a URI parameter, the server attempts to retrieve data from that URI. However, instead of saving the response to its file storage, the Parse Server crashes, allowing potential exploitation of arbitrary URIs. This vulnerability has been addressed in updates 7.5.4 and 8.4.0-alpha.1, and system administrators are encouraged to upgrade their installations to mitigate the risks associated with this flaw.

Affected Version(s)

parse-server >= 4.2.0, < 7.5.4 < 4.2.0, 7.5.4

parse-server >= 8.0.0, <= 8.4.0-alpha.1 <= 8.0.0, 8.4.0-alpha.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-64430 : Server-Side Request Forgery Vulnerability in Parse Server by Parse Community