SB2025101724 - Prototype pollution in Parse SDK js
Published: October 17, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Prototype pollution (CVE-ID: CVE-2025-62374)
The vulnerability allows a remote user to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation in ParseObject.fromJSON, ParseObject.pin, ParseObject.registerSubclass,
ObjectStateMutations (internal), and encode/decode (internal) methods. A remote user can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.
Remediation
Install update from vendor's website.