CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-30848
6.30.08%

CVE-2026-30848: Path Traversal Vulnerability in Parse Server PagesRouter

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 9, 2026·6 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Parse Server versions prior to 8.6.8 and 9.5.0-alpha.8 are vulnerable to a path traversal attack. The application uses a flawed string prefix comparison for directory boundary checks, allowing unauthenticated attackers to read arbitrary files from sibling directories.

Parse Server's PagesRouter component contains a path traversal vulnerability due to insufficient validation of static file request paths. Unauthenticated attackers can leverage URL-encoded sequences to read files from sibling directories that share the same naming prefix as the configured pages directory.

Vulnerability Overview

Parse Server utilizes the PagesRouter component to serve static files associated with system pages, such as email verification and password reset screens. This component processes incoming HTTP requests and maps them to physical files residing within a configured pagesPath directory. A vulnerability within this routing logic permits path traversal, classified under CWE-22, enabling unauthenticated read operations.

The core issue manifests when the router validates whether a requested file path falls within the boundaries of the designated base directory. The validation mechanism relies on a standard string prefix comparison instead of a robust directory boundary evaluation. This design oversight exposes the system to unauthorized access outside the intended directory structure.

Exploitation requires specific conditions on the host filesystem. The target directory must share the exact string prefix as the configured pagesPath directory. When these prerequisites are met, an attacker can retrieve sensitive files located in sibling directories, bypassing the intended access controls and compromising data confidentiality.

Root Cause Analysis

The path validation flaw originates in src/Routers/PagesRouter.js, where the application sanitizes and verifies the requested file paths. The logic first applies path.normalize() to resolve any traversal sequences such as ../ or ./ within the input URL. After normalization, the resulting path is evaluated against the configured this.pagesPath variable.

The critical failure occurs during this boundary evaluation step. The code executes normalizedPath.startsWith(this.pagesPath) to confirm the file remains within the allowed directory tree. Because startsWith performs a strict string-level comparison without acknowledging directory separators, it fails to differentiate between a nested file and a sibling directory sharing the same prefix.

For example, if the application configures the base directory as /var/www/pages, the startsWith function validates any path beginning with that exact string. A request traversing to /var/www/pages-secret/config.json yields a normalized path that successfully passes the prefix check. The application processes the request, incorrectly assuming the target file resides within the approved pages directory.

Code Analysis

The vulnerability exists within a specific conditional block in the PagesRouter class. The original implementation attempts to restrict file access by throwing an error if the normalized path does not begin with the allowed base path string.

// Vulnerable Implementation (src/Routers/PagesRouter.js)
const normalizedPath = path.normalize(filePath);
 
// Abort if the path is outside of the path directory scope
if (!normalizedPath.startsWith(this.pagesPath)) {
    throw errors.fileOutsideAllowedScope;
}

The patched implementation resolves this semantic gap by enforcing a strict directory boundary. The patch concatenates the platform-specific directory separator (path.sep) to the end of the allowed base path before executing the prefix comparison.

// Patched Implementation (src/Routers/PagesRouter.js)
const normalizedPath = path.normalize(filePath);
 
// Abort if the path is outside of the path directory scope
if (!normalizedPath.startsWith(this.pagesPath + path.sep)) {
    throw errors.fileOutsideAllowedScope;
}

This modification ensures that the validation logic requires the target path to exist strictly as a child of the base directory. By appending the separator, the check against /var/www/pages/ automatically rejects traversal attempts targeting /var/www/pages-secret/, mitigating the bypass technique.

Exploitation Methodology

Attackers exploit this vulnerability by dispatching crafted HTTP GET requests to the public-facing pages route, typically exposed under the /apps/ endpoint. The attack payload utilizes URL-encoded path traversal sequences, specifically %2e%2e%2f representing ../, to manipulate the file path resolution process.

A functional proof-of-concept requires the existence of a target directory adjacent to the configured pagesPath. If the application serves pages from a directory named pages, the attacker targets a sibling directory such as pages-secret. The corresponding HTTP request takes the form of GET /apps/%2e%2e%2fpages-secret%2fsecret.txt HTTP/1.1.

Upon receiving the request, the application normalizes the path, stripping the traversal sequences while resolving the absolute location. The resulting string is /path/to/pages-secret/secret.txt. Since this string begins with /path/to/pages, the vulnerable validation check succeeds. The server processes the file read operation and returns the contents of the target file in the HTTP response body.

Impact Assessment

The vulnerability enables unauthorized, unauthenticated retrieval of files stored on the underlying filesystem. This file read capability directly impacts system confidentiality by exposing potentially sensitive data. The CVSS 4.0 base score of 6.3 reflects the medium severity of this issue, governed primarily by the specific prerequisites required for successful exploitation.

The exploit scope is strictly limited to sibling directories that share the exact nomenclature prefix of the configured base directory. An attacker cannot arbitrarily traverse the entire filesystem to read files in standard locations such as /etc/passwd or /var/log/syslog unless the base directory configuration aligns with those paths. This constraint significantly reduces the overall impact radius.

Despite these limitations, the vulnerability poses a material risk in environments where configuration files, environment variables, or other sensitive application data reside adjacent to the static pages directory. The unauthenticated nature of the attack vector allows remote adversaries to systematically probe for predictable sibling directory names without requiring valid credentials.

Remediation and Mitigation

System administrators must update Parse Server installations to the appropriate patched releases to permanently resolve this vulnerability. The official maintainers have published fixes in Parse Server version 8.6.8 for the 8.x release line and version 9.5.0-alpha.8 for the 9.x release line. Applying these updates replaces the vulnerable routing logic with the robust directory separator validation check.

In scenarios where immediate patching is unfeasible, administrators can deploy a configuration-based workaround. The vulnerability relies on the existence of sibling directories sharing the same prefix string. By renaming the configured pagesPath directory to a completely unique string, administrators eliminate the requisite filesystem conditions for the exploit.

Additionally, deploying a Web Application Firewall (WAF) rule to intercept and block incoming requests containing URL-encoded traversal sequences (%2e%2e%2f) offers an effective interim defense mechanism. This network-level mitigation prevents the malicious payloads from reaching the vulnerable application component.

Fix Analysis (1)

Technical Appendix

CVSS Score
6.3/ 10
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS Probability
0.08%
Top 77% most exploited

Affected Systems

Parse Server 8.xParse Server 9.x

Affected Versions Detail

Product
Affected Versions
Fixed Version
Parse Server 8.x
Parse Community
< 8.6.88.6.8
Parse Server 9.x
Parse Community
< 9.5.0-alpha.89.5.0-alpha.8
AttributeDetail
CWE IDCWE-22
Attack VectorNetwork
CVSS Score6.3
EPSS Percentile23.37%
ImpactLocal File Disclosure
Exploit StatusPoC Available
Authentication RequiredNone

MITRE ATT&CK Mapping

T1083File and Directory Discovery
Discovery
T1005Data from Local System
Collection
CWE-22
Path Traversal

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Vulnerability Timeline

Vulnerability publicly disclosed and CVE-2026-30848 assigned
2026-03-07
Fix released in Parse Server 8.6.8 and 9.5.0
2026-03-07
NVD record updated with CVSS 4.0 assessment
2026-03-09

References & Sources

  • [1]NVD Record
  • [2]GitHub Advisory
  • [3]Fix Pull Request
  • [4]Fix Commit

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.