Impact
This is not a Parse Server package vulnerability. This affects the repository's CI/CD infrastructure only, including any public GitHub forks with GitHub Actions enabled. A GitHub CI workflow is triggered in a way that grants the GitHub Actions workflow elevated permissions, giving it access to GitHub secrets and write permissions defined in the workflow that could potentially include code from a fork or lifecycle scripts.
Patches
The elevated permissions have been removed. Fixed in alpha branch as of commit 6b9f896 and in release branch as of commit e3d27fe. If you forked Parse Server in a public GitHub repository, push the latests commits to bring your forked alpha and release branches up-to-date with the parent repository.
Impact
This is not a Parse Server package vulnerability. This affects the repository's CI/CD infrastructure only, including any public GitHub forks with GitHub Actions enabled. A GitHub CI workflow is triggered in a way that grants the GitHub Actions workflow elevated permissions, giving it access to GitHub secrets and write permissions defined in the workflow that could potentially include code from a fork or lifecycle scripts.
Patches
The elevated permissions have been removed. Fixed in
alphabranch as of commit 6b9f896 and inreleasebranch as of commit e3d27fe. If you forked Parse Server in a public GitHub repository, push the latests commits to bring your forkedalphaandreleasebranches up-to-date with the parent repository.