{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T12:43:05.512","vulnerabilities":[{"cve":{"id":"CVE-2020-26288","sourceIdentifier":"security-advisories@github.com","published":"2020-12-30T20:15:15.267","lastModified":"2024-11-21T05:19:46.160","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package \"parse-server\". In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage."},{"lang":"es","value":"Parse Server es un backend de código abierto que puede ser implementado en cualquier infraestructura que pueda ejecutar Node.js.&#xa0;Es un paquete npm \"parse-server\".&#xa0;En Parse Server versiones anteriores a 4.5.0, las contraseñas de usuario involucradas en la autenticación LDAP son almacenadas en texto sin cifrar.&#xa0;Esto es corregido en versión 4.5.0 al eliminar una contraseña después de la autenticación para impedir un almacenamiento de contraseña en texto sin cifrar."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-312"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*","versionEndExcluding":"4.5.0","matchCriteriaId":"4ABD5782-BD2E-4931-A732-E9FD231BC344"}]}]}],"references":[{"url":"https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/parse-community/parse-server/releases/tag/4.5.0","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://www.npmjs.com/package/parse-server","source":"security-advisories@github.com","tags":["Product","Third Party Advisory"]},{"url":"https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/parse-community/parse-server/releases/tag/4.5.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.npmjs.com/package/parse-server","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Third Party Advisory"]}]}}]}