parse-server vulnerabilities

An express module providing a Parse-compatible API server

Package Health Score

71/100
  • securitySecurity issues found
  • popularityPopular
  • maintenanceHealthy
  • communityActive

Maintenance

HEALTHY

Commit Frequency

Loading chart...

Open Issues
373
Open PR
111
New PRS
1
Last Release
14 days ago
Last Commit
1 days ago
Maintainers
5

Further analysis of the maintenance status of parse-server based on released npm versions cadence, the repository activity, and other data points determined that its maintenance is Healthy.

We found that parse-server demonstrates a positive version release cadence with at least one new version released in the past 3 months.

As a healthy sign for on-going project maintenance, we found that the GitHub repository had at least 1 pull request or issue interacted with by the community.

Popularity

POPULAR
Weekly downloads (16.6k)
GitHub Stars
21.4k
Forks
4.8k
Contributors
320

The npm package parse-server receives a total of 16,551 downloads a week. As such, we scored parse-server popularity level to be Popular.

Based on project statistics from the GitHub repository for the npm package parse-server, we found that it has been starred 21,392 times.

Downloads are calculated as moving averages for a period of the last 12 months, excluding weekends and known missing data points.

Community

ACTIVE
Readme.md
No
Contributing.md
Yes
Code of Conduct
Yes
Contributors
320
Funding
Yes
LICENSE
Apache-2.0

A good and healthy external contribution signal for parse-server project, which invites more than one hundred open source maintainers to collaborate on the repository.

How about a good first contribution to this project? It seems that parse-server is missing a README file.

License

BSD-2-Clause>=1.0.0 <2.0.2;
BSD-3-Clause>=2.0.2 <6.0.0-alpha.31;
Apache-2.0>=6.0.0-alpha.31;

Direct Vulnerabilities

Known vulnerabilities in the parse-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free

Security

SECURITY ISSUES FOUND
Show only direct vulnerabilities in latest version
VulnerabilityVulnerable Version
  • H
Missing Authentication for Critical Function

<8.6.52>=9.0.0-alpha.1 <9.6.0-alpha.41
  • M
Information Exposure

<8.6.51>=9.0.0-alpha.1 <9.6.0-alpha.40
  • H
Information Exposure

<8.6.50>=9.0.0 <9.6.0-alpha.35
  • H
Improperly Controlled Sequential Memory Allocation

<8.6.47>=9.0.0-alpha.1 <9.6.0-alpha.24
  • M
Weak Authentication

<8.6.49>=9.0.0-alpha.1 <9.6.0-alpha.29
  • L
Time-of-check Time-of-use (TOCTOU) Race Condition

<8.6.48>=9.0.0-alpha.1 <9.6.0-alpha.28
  • M
Prototype Pollution

<8.6.44>=9.0.0-alpha.1 <9.6.0-alpha.20
  • H
Improper Validation of Syntactic Correctness of Input

<8.6.43>=9.0.0-alpha.1 <9.6.0-alpha.19
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

<8.6.42>=9.0.0-alpha.1 <9.6.0-alpha.17
  • H
Uncontrolled Recursion

<8.6.45>=9.0.0-alpha.1 <9.6.0-alpha.21
  • H
Cross-site Scripting (XSS)

<8.6.41>=9.0.0-alpha.1 <9.6.0-alpha.15
  • M
Missing Authentication for Critical Function

<8.6.40>=9.0.0-alpha.1 <9.6.0-alpha.14
  • H
Incorrect Authorization

<8.6.21>=9.0.0-alpha.1 <9.5.2-alpha.8
  • M
Incorrect Authorization

<8.6.18>=9.0.0-alpha.1 <9.5.2-alpha.5
  • M
Function Call With Incorrect Order of Arguments

>=8.0.2 <8.6.39>=9.0.0-alpha.1 <9.6.0-alpha.13
  • C
Improper Neutralization of Special Elements in Data Query Logic

<8.6.38>=9.0.0-alpha.1 <9.6.0-alpha.12
  • C
Race Condition

<8.6.37>=9.0.0-alpha.1 <9.6.0-alpha.11
  • M
Information Exposure

<8.6.35>=9.0.0-alpha.1 <9.6.0-alpha.9
  • H
SQL Injection

<8.6.36>=9.0.0-alpha.1 <9.6.0-alpha.10
  • C
Missing Authorization

<8.6.20>=9.0.0-alpha.1 <9.5.2-alpha.7
  • M
Insufficiently Protected Credentials

<8.6.22>=9.0.0-alpha.1 <9.5.2-alpha.9
  • H
Allocation of Resources Without Limits or Throttling

<8.6.15>=9.0.0-alpha.1 <9.5.2-alpha.2
  • C
SQL Injection

<8.6.31>=9.0.0-alpha.1 <9.6.0-alpha.5
  • H
Incorrect Authorization

<8.6.16>=9.0.0-alpha.1 <9.5.2-alpha.3
  • M
Improper Control of Interaction Frequency

<8.6.23>=9.0.0-alpha.1 <9.5.2-alpha.10
  • C
Operation on a Resource after Expiration or Release

<8.6.33>=9.0.0-alpha.1 <9.6.0-alpha.7
  • C
Improper Neutralization of Special Elements in Data Query Logic

<8.6.14>=9.0.0-alpha.1 <9.5.2-alpha.1
  • H
Incorrect Authorization

<8.6.32>=9.0.0-alpha.1 <9.6.0-alpha.6
  • M
Information Exposure

<8.6.34>=9.0.0-alpha.1 <9.6.0-alpha.8
  • M
Cross-site Scripting (XSS)

<8.6.30>=9.0.0-alpha.1 <9.6.0-alpha.4
  • M
LDAP Injection

<8.6.26>=9.0.0-alpha.1 <9.5.2-alpha.13
  • H
Incorrect Authorization

<8.6.19>=9.0.0-alpha.1 <9.5.2-alpha.6
  • H
Missing Authorization

<8.6.25>=9.0.0-alpha.1 <9.5.2-alpha.12
  • C
SQL Injection

<8.6.29>=9.0.0-alpha.1 <9.6.0-alpha.3
  • C
SQL Injection

<8.6.28>=9.0.0-alpha.1 <9.6.0-alpha.2
  • H
Cross-site Scripting (XSS)

<8.6.17>=9.0.0 <9.5.2-alpha.4
  • H
Prototype Pollution

>=9.0.0-alpha.1 <9.5.1-alpha.2<8.6.13
  • M
Improper Check for Unusual or Exceptional Conditions

>=9.0.0-alpha.1 <9.5.1-alpha.1<8.6.12

Package versions

706 VERSIONS IN TOTAL See all versions
versionpublisheddirect vulnerabilities
9.6.0-alpha.5522 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.5422 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.5321 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.5221 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.5121 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.5021 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.4921 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.4821 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.4720 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.6.0-alpha.4620 Mar, 2026
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L