VYPR
Critical severityNVD Advisory· Published Feb 25, 2026· Updated Feb 25, 2026

Parse Dashboard Missing Authorization on Agent Endpoint

CVE-2026-27608

Description

Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha.7, the AI Agent API endpoint (POST /apps/:appId/agent) does not enforce authorization. Authenticated users scoped to specific apps can access any other app's agent endpoint by changing the app ID in the URL. Read-only users are given the full master key instead of the read-only master key and can supply write permissions in the request body to perform write and delete operations. Only dashboards with agent configuration enabled are affected. The fix in version 9.0.0-alpha.8 adds per-app authorization checks and restricts read-only users to the readOnlyMasterKey with write permissions stripped server-side. As a workaround, remove the agent configuration block from your dashboard configuration. Dashboards without an agent config are not affected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Parse Dashboard AI Agent endpoint lacks authorization, allowing authenticated users to access other apps and read-only users to perform write operations.

Vulnerability

Overview

The AI Agent API endpoint (POST /apps/:appId/agent) in Parse Dashboard versions 7.3.0-alpha.42 through 9.0.0-alpha.7 fails to enforce proper authorization checks [2]. This means that while the endpoint requires authentication, it does not all authenticated requests are validated against the app ID provided in the URL path. The root cause is the absence of per-app authorization logic for this specific endpoint, which was introduced as noted in the advisory only affects dashboards that have the agent configuration block enabled [4].

Exploitation

Details

An authenticated user who is legitimately scoped to one Parse Server app can simply change the :appId parameter in the URL to access the AI Agent endpoint of any other app managed by the same dashboard [2]. Furthermore, the system incorrectly assigns the full master key to users designated as read-only, instead of the intended readOnlyMasterKey. This allows a read-only user to include write permissions in the request body and perform write or delete operations through the agent endpoint [4]. No additional authentication bypass is needed; the vulnerability is purely an authorization failure at the API level.

Impact

A successful exploit enables an attacker to interact with the AI Agent of any app on the dashboard without proper authorization. For read-only users, the impact escalates to full write and delete capabilities, potentially allowing unauthorized data modification or deletion across apps [2]. The confidentiality and integrity of all apps managed by the affected dashboard are at risk.

Mitigation

The vulnerability is fixed in Parse Dashboard version 9.0.0-alpha.8, which adds per-app authorization checks and ensures read-only users are restricted to the readOnlyMasterKey with write permissions stripped server-side [3]. As a workaround, administrators can remove the agent configuration block from their dashboard configuration; dashboards without this feature enabled are not affected [4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
parse-dashboardnpm
>= 7.3.0-alpha.42, < 9.0.0-alpha.89.0.0-alpha.8

Affected products

2
  • Range: >=7.3.0-alpha.42, <=9.0.0-alpha.7
  • parse-community/parse-dashboardv5
    Range: >= 7.3.0-alpha.42, < 9.0.0-alpha.8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.