Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4263-jgmp-7pf4 Parse Server's Cloud function dispatch crashes server via prototype chain traversal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround.
Title Parse Server's Cloud function dispatch crashes server via prototype chain traversal
Weaknesses CWE-1321
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-18T21:42:27.210Z

Reserved: 2026-03-16T21:03:44.421Z

Link: CVE-2026-32886

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-18T22:16:25.663

Modified: 2026-03-18T22:16:25.663

Link: CVE-2026-32886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses