CVE-2026-35200
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.73 and 9.7.1-alpha.4, a file can be uploaded with a filename extension that passes the file extension allowlist (e.g., .txt) but with a Content-Type header that differs from the extension (e.g., text/html). The Content-Type is passed to the storage adapter without consistency validation. Storage adapters that store and serve the provided Content-Type (such as S3 or GCS) serve the file with the mismatched Content-Type. The default GridFS adapter is not affected because it derives Content-Type from the filename at serving time. This vulnerability is fixed in 8.6.73 and 9.7.1-alpha.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | >= 9.0.0, < 9.7.1-alpha.4 | 9.7.1-alpha.4 |
parse-servernpm | < 8.6.73 | 8.6.73 |
Affected products
4cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*+ 3 more
- cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*range: <8.6.73
- cpe:2.3:a:parseplatform:parse-server:9.7.1:alpha1:*:*:*:node.js:*:*
- cpe:2.3:a:parseplatform:parse-server:9.7.1:alpha2:*:*:*:node.js:*:*
- cpe:2.3:a:parseplatform:parse-server:9.7.1:alpha3:*:*:*:node.js:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/parse-community/parse-server/pull/10383nvdIssue TrackingPatchWEB
- github.com/parse-community/parse-server/pull/10384nvdIssue TrackingPatchWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-vr5f-2r24-w5hcnvdMitigationPatchVendor AdvisoryWEB
- github.com/advisories/GHSA-vr5f-2r24-w5hcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35200ghsaADVISORY
News mentions
0No linked articles in our index yet.