CVE-2026-30948: Parse Server vulnerable to stored cross-site scripting (XSS) via SVG file upload
A stored cross-site scripting (XSS) vulnerability allows any authenticated user to upload an SVG file containing JavaScript. The file is served inline with Content-Type: image/svg+xml and without protective headers, causing the browser to execute embedded scripts in the Parse Server origin. This can be exploited to steal session tokens from localStorage and achieve account takeover.
The default fileExtensions option blocks HTML file extensions but does not block SVG, which is a well-known XSS vector. All Parse Server deployments where file upload is enabled for authenticated users (the default) are affected.
References
- github.com/advisories/GHSA-hcj7-6gxh-24ww
- github.com/parse-community/parse-server
- github.com/parse-community/parse-server/releases/tag/8.6.17
- github.com/parse-community/parse-server/releases/tag/9.5.2-alpha.4
- github.com/parse-community/parse-server/security/advisories/GHSA-hcj7-6gxh-24ww
- nvd.nist.gov/vuln/detail/CVE-2026-30948
Code Behaviors & Features
Detect and mitigate CVE-2026-30948 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →