{"id":"CVE-2023-36475","summary":"Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution","details":"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.","aliases":["BIT-parse-2023-36475","GHSA-462x-c3jw-7vr6"],"modified":"2026-04-10T05:00:12.844913Z","published":"2023-06-28T22:32:10.081Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/36xxx/CVE-2023-36475.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-1321"]},"references":[{"type":"WEB","url":"https://github.com/parse-community/parse-server/releases/tag/5.5.2"},{"type":"WEB","url":"https://github.com/parse-community/parse-server/releases/tag/6.2.1"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/36xxx/CVE-2023-36475.json"},{"type":"ADVISORY","url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36475"},{"type":"REPORT","url":"https://github.com/parse-community/parse-server/issues/8674"},{"type":"REPORT","url":"https://github.com/parse-community/parse-server/issues/8675"},{"type":"FIX","url":"https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90"},{"type":"FIX","url":"https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/parse-community/parse-server","events":[{"introduced":"0"},{"fixed":"e6374e791d29291bfe6d97e9f354100081caf930"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.5.2"}]}},{"type":"GIT","repo":"https://github.com/parse-community/parse-server","events":[{"introduced":"f7eee19dbad96f15440848a45e9ba4b2c0436f03"},{"fixed":"328918178f751cca1615878e8ab94c200edf804f"}],"database_specific":{"versions":[{"introduced":"6.0.0"},{"fixed":"6.2.1"}]}}],"versions":["2.0.0","2.0.1","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.0.7","2.0.8","2.1.0","2.1.1","2.1.2","2.1.3","2.1.4","2.1.5","2.1.6","2.2.0","2.2.1","2.2.10","2.2.11","2.2.12","2.2.13","2.2.14","2.2.15","2.2.16","2.2.17","2.2.18","2.2.19","2.2.2","2.2.20","2.2.21","2.2.22","2.2.23","2.2.24","2.2.25","2.2.25-beta.1","2.2.3","2.2.4","2.2.5","2.2.6","2.2.7","2.2.8","2.2.9","2.3.1","2.3.2","2.3.3","2.3.4","2.3.5","2.3.6","2.3.7","2.3.8","2.4.0","2.4.1","2.4.2","2.5.0","2.5.1","2.5.2","2.5.3","2.6.0","2.6.1","2.6.2","2.6.3","2.6.4","2.6.5","2.7.0","2.7.1","2.7.2","2.7.3","2.7.4","2.8.0","2.8.2","3.0.0","3.1.0","3.1.1","3.1.2","3.1.3","3.10.0","3.2.0","3.2.1","3.2.2","3.2.3","3.3.0","3.4.0","3.4.1","3.5.0","3.6.0","3.7.0","3.7.1","3.7.2","3.8.0","3.9.0","4.0.0","4.0.1","4.0.2","4.1.0","4.2.0","4.3.0","4.4.0","4.5.0","5.0.0","5.0.0-alpha.1","5.1.0","5.1.1","5.2.0","5.2.1","5.2.2","5.2.3","5.2.4","5.2.5","5.2.6","5.2.7","5.2.8","5.3.0","5.3.1","5.3.2","5.3.3","5.4.0","5.4.1","5.4.2","5.4.3","5.5.0","5.5.1","6.0.0","6.1.0","6.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36475.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}