Prototype pollution in parse-server - CVE-2022-24760

 

Prototype pollution in parse-server - CVE-2022-24760

Published: March 20, 2022 / Updated: April 6, 2026


Vulnerability identifier: #VU61472
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-24760
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
parse-server
Software vendor:
MeetFox

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in the file DatabaseController.js. A remote attacker can send a specially crafted request to the application and execute arbitrary code on the target system.

This vulnerability affects Parse Server in the default configuration with MongoDB.


Remediation

Install update from vendor's website.

External links