CVE-2025-67727
CRITICALParseplatform Parse-server < 8.5.0 - Code Injection
Title source: ruleDescription
Parse Server is an open source backend that can be deployed to any infrastructure that runs Node.js. In versions prior to 8.6.0-alpha.2, a GitHub CI workflow is triggered in a way that grants the GitHub Actions workflow elevated permissions, giving it access to GitHub secrets and write permissions which are defined in the workflow. Code from a fork or lifecycle scripts is potentially included. Only the repository's CI/CD infrastructure is affected, including any public GitHub forks with GitHub Actions enabled. This issue is fixed version 8.6.0-alpha.2 and commits 6b9f896 and e3d27fe.
References (3)
Scores
CVSS v3
9.8
EPSS
0.0009
EPSS Percentile
25.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-269
CWE-94
Status
published
Products (2)
parseplatform/parse-server
8.6.0 alpha1
parseplatform/parse-server
< 8.5.0
Published
Dec 12, 2025
Tracked Since
Feb 18, 2026