Parse Dashboard Missing Authorization on Agent Endpoint
Description
Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha.7, the AI Agent API endpoint (POST /apps/:appId/agent) does not enforce authorization. Authenticated users scoped to specific apps can access any other app's agent endpoint by changing the app ID in the URL. Read-only users are given the full master key instead of the read-only master key and can supply write permissions in the request body to perform write and delete operations. Only dashboards with agent configuration enabled are affected. The fix in version 9.0.0-alpha.8 adds per-app authorization checks and restricts read-only users to the readOnlyMasterKey with write permissions stripped server-side. As a workaround, remove the agent configuration block from your dashboard configuration. Dashboards without an agent config are not affected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Parse Dashboard AI Agent endpoint lacks authorization, allowing authenticated users to access other apps and read-only users to perform write operations.
Vulnerability
Overview
The AI Agent API endpoint (POST /apps/:appId/agent) in Parse Dashboard versions 7.3.0-alpha.42 through 9.0.0-alpha.7 fails to enforce proper authorization checks [2]. This means that while the endpoint requires authentication, it does not all authenticated requests are validated against the app ID provided in the URL path. The root cause is the absence of per-app authorization logic for this specific endpoint, which was introduced as noted in the advisory only affects dashboards that have the agent configuration block enabled [4].
Exploitation
Details
An authenticated user who is legitimately scoped to one Parse Server app can simply change the :appId parameter in the URL to access the AI Agent endpoint of any other app managed by the same dashboard [2]. Furthermore, the system incorrectly assigns the full master key to users designated as read-only, instead of the intended readOnlyMasterKey. This allows a read-only user to include write permissions in the request body and perform write or delete operations through the agent endpoint [4]. No additional authentication bypass is needed; the vulnerability is purely an authorization failure at the API level.
Impact
A successful exploit enables an attacker to interact with the AI Agent of any app on the dashboard without proper authorization. For read-only users, the impact escalates to full write and delete capabilities, potentially allowing unauthorized data modification or deletion across apps [2]. The confidentiality and integrity of all apps managed by the affected dashboard are at risk.
Mitigation
The vulnerability is fixed in Parse Dashboard version 9.0.0-alpha.8, which adds per-app authorization checks and ensures read-only users are restricted to the readOnlyMasterKey with write permissions stripped server-side [3]. As a workaround, administrators can remove the agent configuration block from their dashboard configuration; dashboards without this feature enabled are not affected [4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-dashboardnpm | >= 7.3.0-alpha.42, < 9.0.0-alpha.8 | 9.0.0-alpha.8 |
Affected products
2- Range: >=7.3.0-alpha.42, <=9.0.0-alpha.7
- parse-community/parse-dashboardv5Range: >= 7.3.0-alpha.42, < 9.0.0-alpha.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-cvwj-6c9h-jg6vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-27608ghsaADVISORY
- github.com/parse-community/parse-dashboard/releases/tag/9.0.0-alpha.8ghsax_refsource_MISCWEB
- github.com/parse-community/parse-dashboard/security/advisories/GHSA-cvwj-6c9h-jg6vghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.