Parse Server has Server-Side Request Forgery (SSRF) in Instagram OAuth Adapter
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.2 and 9.1.1-alpha.1, the Instagram authentication adapter allows clients to specify a custom API URL via the apiURL parameter in authData. This enables SSRF attacks and possibly authentication bypass if malicious endpoints return fake responses to validate unauthorized users. This is fixed in versions 8.6.2 and 9.1.1-alpha.1 by hardcoding the Instagram Graph API URL https://graph.instagram.com and ignoring client-provided apiURL values. No known workarounds are available.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | >= 9.0.0, < 9.1.1-alpha.1 | 9.1.1-alpha.1 |
parse-servernpm | < 8.6.2 | 8.6.2 |
Affected products
1- Range: 2.0.0, 2.0.1, 2.0.2, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-3f5f-xgrj-97pfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-68150ghsaADVISORY
- github.com/parse-community/parse-server/pull/9988ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/pull/9989ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-3f5f-xgrj-97pfghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.