CVE-2026-27608
Published: 25 February 2026
Summary
CVE-2026-27608 is a high-severity Missing Authorization (CWE-862) vulnerability in Parseplatform Parse Dashboard. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 10.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as Other AI Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for the AI Agent API endpoint to prevent app-scoped users from accessing other apps via appId manipulation.
Applies least privilege to restrict read-only users to readOnlyMasterKey without write permissions, blocking unauthorized writes and deletes.
Remediates the specific authorization flaw by applying patches like version 9.0.0-alpha.8 with per-app checks and server-side restrictions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization on the /agent endpoint directly enables post-authentication privilege escalation (read-only users obtain full master key and perform cross-app write/delete actions).
NVD Description
Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha.7, the AI Agent API endpoint (`POST /apps/:appId/agent`) does not enforce authorization. Authenticated users scoped to specific apps can access any other app's agent endpoint…
more
by changing the app ID in the URL. Read-only users are given the full master key instead of the read-only master key and can supply write permissions in the request body to perform write and delete operations. Only dashboards with `agent` configuration enabled are affected. The fix in version 9.0.0-alpha.8 adds per-app authorization checks and restricts read-only users to the `readOnlyMasterKey` with write permissions stripped server-side. As a workaround, remove the `agent` configuration block from your dashboard configuration. Dashboards without an `agent` config are not affected.
Deeper analysisAI
CVE-2026-27608 is a missing authorization vulnerability (CWE-862) in Parse Dashboard, a standalone dashboard for managing Parse Server apps. It affects versions 7.3.0-alpha.42 through 9.0.0-alpha.7, specifically the AI Agent API endpoint at POST /apps/:appId/agent, which fails to enforce proper authorization checks. The issue carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). Only dashboards with the agent configuration enabled are vulnerable.
Authenticated users scoped to specific apps can exploit the flaw by altering the app ID in the URL to access the agent endpoint of any other app. Read-only users receive the full master key rather than the read-only master key, enabling them to include write permissions in the request body and perform unauthorized write and delete operations across apps.
The fix in version 9.0.0-alpha.8 adds per-app authorization checks and server-side restrictions that limit read-only users to the readOnlyMasterKey with write permissions stripped. As a workaround, remove the agent configuration block from the dashboard setup, as dashboards lacking this config are unaffected. Details are available in the GitHub release notes at https://github.com/parse-community/parse-dashboard/releases/tag/9.0.0-alpha.8 and security advisory at https://github.com/parse-community/parse-dashboard/security/advisories/GHSA-cvwj-6c9h-jg6v.
This vulnerability pertains to the AI Agent API endpoint, highlighting authorization risks in AI/ML-integrated management interfaces for Parse Server deployments.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai