{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T23:37:38.654","vulnerabilities":[{"cve":{"id":"CVE-2025-64502","sourceIdentifier":"security-advisories@github.com","published":"2025-11-10T22:15:37.870","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. The MongoDB `explain()` method provides detailed information about query execution plans, including index usage, collection scanning behavior, and performance metrics. Prior to version 8.5.0-alpha.5, Parse Server permits any client to execute explain queries without requiring the master key. This exposes database schema structure and field names, index configurations and query optimization details, query execution statistics and performance metrics, and potential attack vectors for database performance exploitation. In version 8.5.0-alpha.5, a new `databaseOptions.allowPublicExplain` configuration option has been introduced that allows to restrict `explain` queries to the master key. The option defaults to `true` for now to avoid a breaking change in production systems that depends on public `explain` availability. In addition, a security warning is logged when the option is not explicitly set, or set to `true`. In a future major release of Parse Server, the default will change to `false`. As a workaround, implement middleware to block explain queries from non-master-key requests, or monitor and alert on explain query usage in production environments."},{"lang":"es","value":"Parse Server es un backend de código abierto que puede implementarse en cualquier infraestructura que pueda ejecutar Node.js. El método 'explain()' de MongoDB proporciona información detallada sobre los planes de ejecución de consultas, incluyendo el uso de índices, el comportamiento de escaneo de colecciones y las métricas de rendimiento. Antes de la versión 8.5.0-alpha.5, Parse Server permite a cualquier cliente ejecutar consultas explain sin requerir la clave maestra. Esto expone la estructura del esquema de la base de datos y los nombres de los campos, las configuraciones de índices y los detalles de optimización de consultas, las estadísticas de ejecución de consultas y las métricas de rendimiento, y posibles vectores de ataque para la explotación del rendimiento de la base de datos. En la versión 8.5.0-alpha.5, se ha introducido una nueva opción de configuración 'databaseOptions.allowPublicExplain' que permite restringir las consultas 'explain' a la clave maestra. La opción por defecto es 'true' por ahora para evitar un cambio disruptivo en los sistemas de producción que dependen de la disponibilidad pública de 'explain'. Además, se registra una advertencia de seguridad cuando la opción no se establece explícitamente, o se establece en 'true'. En una futura versión principal de Parse Server, el valor por defecto cambiará a 'false'. Como solución alternativa, implemente middleware para bloquear las consultas explain de solicitudes sin clave maestra, o monitoree y alerte sobre el uso de consultas explain en entornos de producción."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-201"}]}],"references":[{"url":"https://github.com/parse-community/parse-server/commit/4456b02280c2d8dd58b7250e9e67f1a8647b3452","source":"security-advisories@github.com"},{"url":"https://github.com/parse-community/parse-server/pull/9890","source":"security-advisories@github.com"},{"url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-7cx5-254x-cgrq","source":"security-advisories@github.com"}]}}]}