CVE-2026-27608

Source
https://cve.org/CVERecord?id=CVE-2026-27608
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27608.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27608
Aliases
Published
2026-02-25T02:16:30.622Z
Modified
2026-03-03T02:56:32.337902Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N CVSS Calculator
Summary
Parse Dashboard Missing Authorization on Agent Endpoint
Details

Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha.7, the AI Agent API endpoint (POST /apps/:appId/agent) does not enforce authorization. Authenticated users scoped to specific apps can access any other app's agent endpoint by changing the app ID in the URL. Read-only users are given the full master key instead of the read-only master key and can supply write permissions in the request body to perform write and delete operations. Only dashboards with agent configuration enabled are affected. The fix in version 9.0.0-alpha.8 adds per-app authorization checks and restricts read-only users to the readOnlyMasterKey with write permissions stripped server-side. As a workaround, remove the agent configuration block from your dashboard configuration. Dashboards without an agent config are not affected.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27608.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-862"
    ]
}
References

Affected packages

Git / github.com/parse-community/parse-dashboard

Affected ranges

Type
GIT
Repo
https://github.com/parse-community/parse-dashboard
Events

Affected versions

7.*
7.3.0
7.3.0-alpha.42
7.3.0-alpha.43
7.3.0-alpha.44
7.4.0
7.4.0-alpha.1
7.4.0-alpha.2
7.4.0-alpha.3
7.4.0-alpha.4
7.4.0-alpha.5
7.5.0
7.5.0-alpha.1
7.5.0-alpha.2
7.6.0-alpha.1
7.6.0-alpha.10
7.6.0-alpha.11
7.6.0-alpha.12
7.6.0-alpha.13
7.6.0-alpha.2
7.6.0-alpha.3
7.6.0-alpha.4
7.6.0-alpha.5
7.6.0-alpha.6
7.6.0-alpha.7
7.6.0-alpha.8
7.6.0-alpha.9
8.*
8.0.0
8.0.0-alpha.1
8.0.0-alpha.2
8.0.0-alpha.3
8.0.0-alpha.4
8.0.0-alpha.5
8.0.0-alpha.6
8.1.0
8.1.0-alpha.1
8.1.0-alpha.10
8.1.0-alpha.11
8.1.0-alpha.12
8.1.0-alpha.13
8.1.0-alpha.2
8.1.0-alpha.3
8.1.0-alpha.4
8.1.0-alpha.5
8.1.0-alpha.6
8.1.0-alpha.7
8.1.0-alpha.8
8.1.0-alpha.9
8.1.1-alpha.1
8.2.0
8.2.0-alpha.1
8.2.0-alpha.10
8.2.0-alpha.11
8.2.0-alpha.12
8.2.0-alpha.13
8.2.0-alpha.14
8.2.0-alpha.15
8.2.0-alpha.16
8.2.0-alpha.17
8.2.0-alpha.18
8.2.0-alpha.19
8.2.0-alpha.2
8.2.0-alpha.20
8.2.0-alpha.21
8.2.0-alpha.22
8.2.0-alpha.23
8.2.0-alpha.24
8.2.0-alpha.25
8.2.0-alpha.26
8.2.0-alpha.27
8.2.0-alpha.3
8.2.0-alpha.4
8.2.0-alpha.5
8.2.0-alpha.6
8.2.0-alpha.7
8.2.0-alpha.8
8.2.0-alpha.9
8.3.0
8.3.0-alpha.1
8.3.0-alpha.10
8.3.0-alpha.11
8.3.0-alpha.12
8.3.0-alpha.13
8.3.0-alpha.14
8.3.0-alpha.15
8.3.0-alpha.16
8.3.0-alpha.17
8.3.0-alpha.18
8.3.0-alpha.19
8.3.0-alpha.2
8.3.0-alpha.20
8.3.0-alpha.21
8.3.0-alpha.22
8.3.0-alpha.23
8.3.0-alpha.24
8.3.0-alpha.25
8.3.0-alpha.26
8.3.0-alpha.27
8.3.0-alpha.28
8.3.0-alpha.29
8.3.0-alpha.3
8.3.0-alpha.30
8.3.0-alpha.31
8.3.0-alpha.32
8.3.0-alpha.33
8.3.0-alpha.34
8.3.0-alpha.35
8.3.0-alpha.36
8.3.0-alpha.37
8.3.0-alpha.38
8.3.0-alpha.39
8.3.0-alpha.4
8.3.0-alpha.40
8.3.0-alpha.41
8.3.0-alpha.42
8.3.0-alpha.43
8.3.0-alpha.5
8.3.0-alpha.6
8.3.0-alpha.7
8.3.0-alpha.8
8.3.0-alpha.9
8.4.0
8.4.0-alpha.1
8.4.1-alpha.1
8.4.1-alpha.2
8.5.0
8.5.0-alpha.1
8.5.0-alpha.2
8.5.0-alpha.3
8.5.0-alpha.4
8.5.0-alpha.5
8.5.0-alpha.6
8.5.0-alpha.7
9.*
9.0.0-alpha.1
9.0.0-alpha.2
9.0.0-alpha.3
9.0.0-alpha.4
9.0.0-alpha.5
9.0.0-alpha.6
9.0.0-alpha.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27608.json"