Skip to content

Commit 7e4c43d

Browse files
1 parent 9e2e552 commit 7e4c43d

File tree

2 files changed

+158
-0
lines changed

2 files changed

+158
-0
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7cx5-254x-cgrq",
4+
"modified": "2025-11-13T00:09:41Z",
5+
"published": "2025-11-13T00:09:41Z",
6+
"aliases": [
7+
"CVE-2025-64502"
8+
],
9+
"summary": "Parse Server allows public `explain` queries which may expose sensitive database performance information and schema details",
10+
"details": "### Impact\n\nThe MongoDB `explain()` method provides detailed information about query execution plans, including index usage, collection scanning behavior, and performance metrics. Parse Server permits any client to execute explain queries without requiring the master key. This exposes:\n\n- Database schema structure and field names\n- Index configurations and query optimization details\n- Query execution statistics and performance metrics\n- Potential attack vectors for database performance exploitation\n\n### Patches\n\nA new `databaseOptions.allowPublicExplain` configuration option has been introduced that allows to restrict `explain` queries to the master key. The option defaults to `true` for now to avoid a breaking change in production systems that depends on public `explain` availability. In addition, a security warning is logged when the option is not explicitly set, or set to `true`. In a future major release of Parse Server, the default will change to `false`.\n\n### Workarounds\n\nImplementing middleware to block explain queries from non-master-key requests, or monitor and alert on explain query usage in production environments.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "parse-server"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "8.5.0-alpha.5"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-7cx5-254x-cgrq"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64502"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/parse-community/parse-server/pull/9890"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/parse-community/parse-server/commit/4456b02280c2d8dd58b7250e9e67f1a8647b3452"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/parse-community/parse-server"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-201"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-11-13T00:09:41Z",
67+
"nvd_published_at": "2025-11-10T22:15:37Z"
68+
}
69+
}
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fc2v-vcwj-269v",
4+
"modified": "2025-11-13T00:10:50Z",
5+
"published": "2025-11-13T00:10:50Z",
6+
"aliases": [
7+
"CVE-2025-64508"
8+
],
9+
"summary": "Bugsink is vulnerable to unauthenticated remote DoS via crafted Brotli input",
10+
"details": "### Impact\n\nIn affected versions, brotli \"bombs\" (highly compressed brotli streams, such as many zeros) can be sent to the server. Since the server will attempt to decompress these streams before applying various maximums, this can lead to exhaustion of the available memory and thus a Denial of Service.\n\nThis can be done if the `DSN` is known, which it is in many common setups (JavaScript, Mobile Apps).\n\n### Patches\n\nPatched in Bugsink `2.0.5`",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "bugsink"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.0.5"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/bugsink/bugsink/security/advisories/GHSA-fc2v-vcwj-269v"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64508"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/google/brotli/issues/1327"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/google/brotli/issues/1375"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/bugsink/bugsink/pull/266"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/google/brotli/pull/1234"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://github.com/bugsink/bugsink/commit/3f65544aab3ad5303d97009136640de97b0676a5"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://github.com/google/brotli/commit/67d78bc41db1a0d03f2e763497748f2f69946627"
70+
},
71+
{
72+
"type": "PACKAGE",
73+
"url": "https://github.com/bugsink/bugsink"
74+
},
75+
{
76+
"type": "WEB",
77+
"url": "https://github.com/google/brotli/releases/tag/v1.2.0"
78+
}
79+
],
80+
"database_specific": {
81+
"cwe_ids": [
82+
"CWE-770"
83+
],
84+
"severity": "HIGH",
85+
"github_reviewed": true,
86+
"github_reviewed_at": "2025-11-13T00:10:50Z",
87+
"nvd_published_at": "2025-11-10T22:15:39Z"
88+
}
89+
}

0 commit comments

Comments
 (0)