Parse Server exposes the data schema via GraphQL API
Moderate severity
GitHub Reviewed
Published
Jul 10, 2025
in
parse-community/parse-server
•
Updated Jul 10, 2025
Package
Affected versions
>= 8.0.0, < 8.2.2
>= 5.3.0, < 7.5.3
Patched versions
8.2.2
7.5.3
Description
Published by the National Vulnerability Database
Jul 10, 2025
Published to the GitHub Advisory Database
Jul 10, 2025
Reviewed
Jul 10, 2025
Last updated
Jul 10, 2025
Impact
The Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface.
Patches
The issue has been addressed by requiring the master key for schema introspection. Additionally, a new Parse Server configuration option,
graphQLPublicIntrospection
, has been introduced. This option allows developers to re-enable public schema introspection if their application relies on it. However, it is strongly recommended to use this option only temporarily and to update the application to function without depending on public introspection.Workarounds
None available.
References
References