Unrated severityNVD Advisory· Published Dec 12, 2025· Updated Dec 12, 2025
Parse Server GitHub CI workflow vulnerable to RCE through Improper Privilege Management
CVE-2025-67727
Description
Parse Server is an open source backend that can be deployed to any infrastructure that runs Node.js. In versions prior to 8.6.0-alpha.2, a GitHub CI workflow is triggered in a way that grants the GitHub Actions workflow elevated permissions, giving it access to GitHub secrets and write permissions which are defined in the workflow. Code from a fork or lifecycle scripts is potentially included. Only the repository's CI/CD infrastructure is affected, including any public GitHub forks with GitHub Actions enabled. This issue is fixed version 8.6.0-alpha.2 and commits 6b9f896 and e3d27fe.
Affected products
1- Range: < 8.6.0-alpha.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/parse-community/parse-server/commit/6b9f8963cc3debf59cd9c5dfc5422aff9404ce9dmitrex_refsource_MISC
- github.com/parse-community/parse-server/commit/e3d27fea08c8d8bdd9770a689bc2d757cda48b66mitrex_refsource_MISC
- github.com/parse-community/parse-server/security/advisories/GHSA-6w8g-mgvv-3fcjmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.