If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role.
Improved validation for custom user object IDs. Session tokens for existing users with an object ID that exploits the vulnerability are now rejected.
allowCustomObjectId: false or not setting the option which defaults to false.role:.{
"github_reviewed_at": "2024-10-04T18:50:56Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-285",
"CWE-863"
],
"github_reviewed": true,
"nvd_published_at": "2024-10-04T15:15:13Z"
}