CVE-2021-39138
JavaScript vulnerability analysis and mitigation

Overview

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. The vulnerability (CVE-2021-39138) was discovered and disclosed on August 19, 2021, affecting versions prior to 4.5.1. The issue involves incorrect session creation for anonymous users when signing up through the REST API, where the authProvider field in the _Session class under createdWith incorrectly shows the user logged in using a password instead of anonymous authentication (GitHub Advisory).

Technical details

The vulnerability stems from an authentication provider misclassification in the session creation process. When an anonymous user signs up using the REST API, the server incorrectly sets the session's createdWith.authProvider field to 'password' instead of 'anonymous'. This issue has been assigned a CVSS v3.1 score of 6.5 (MEDIUM) and CVSS v2.0 score of 6.4 (MEDIUM) (NVD Results).

Impact

The vulnerability only affects applications that directly rely on the createdWith field to make security decisions or implement different access levels between password-authenticated and anonymous users. The server's internal functionality is not affected as it does not use the createdWith field for internal decision-making (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in Parse Server version 4.5.1. For users unable to upgrade immediately, the recommended workaround is to avoid using the createdWith Session field for making access control decisions when anonymous login is enabled. The fix does not address incorrect authProvider: password values for existing sessions of anonymous users (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management